TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage
|
|
|
- Edwin Robertson
- 10 years ago
- Views:
Transcription
1 TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: December 2012 Two-Second Advantage
2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE LICENSE FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, Two-Second Advantage and LogLogic are either registered trademarks or trademarks of TIBCO Software Inc. and/or subsidiaries of TIBCO Software Inc. in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only. THIS SOFTWARE MAY BE AVAILABLE ON MULTIPLE OPERATING SYSTEMS. HOWEVER, NOT ALL OPERATING SYSTEM PLATFORMS FOR A SPECIFIC SOFTWARE VERSION ARE RELEASED AT THE SAME TIME. PLEASE SEE THE README.TXT FILE FOR THE AVAILABILITY OF THIS SOFTWARE VERSION ON A SPECIFIC OPERATING SYSTEM PLATFORM. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. THIS DOCUMENT COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THIS DOCUMENT. TIBCO SOFTWARE INC. MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS DOCUMENT AT ANY TIME. THE CONTENTS OF THIS DOCUMENT MAY BE MODIFIED AND/OR QUALIFIED, DIRECTLY OR INDIRECTLY, BY OTHER DOCUMENTATION WHICH ACCOMPANIES THIS SOFTWARE, INCLUDING BUT NOT LIMITED TO ANY RELEASE NOTES AND "READ ME" FILES. Copyright TIBCO Software Inc. ALL RIGHTS RESERVED. TIBCO Software Inc. Confidential Information
3 Contents Preface: About This Guide Technical Support Information Documentation Support Information Contact Information Conventions Chapter 1: LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley LogLogic Reports and Alerts Quick Reference SOX and COBIT Compliance Suite Quick Start Guide
4 CONTENTS SOX and COBIT Compliance Suite Quick Start Guide 4
5 About This Guide : Technical Support Information PREFACE: About This Guide The TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide provides introduction and overview information regarding the Sarbanes-Oxley (SOX) Act and the Control Objectives for Information and Related Technology (COBIT) control framework. It also covers topics related to managing LogLogic s SOX compliance reports, alerts, and using log data collected and aggregated from all types of source systems to monitor and report on SOX compliance. Technical Support Information LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance might be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your Tibco LogLogic Compliance Suites. To reach the LogLogic Support team by telephone: Toll Free LOGS Local EMEA [email protected] Support Website: When contacting LogLogic Support, be prepared to provide the following information: Your name, address, phone number, and fax number Your company name and company address Your appliance model and release version Serial number located on the back of the Appliance or the eth0 MAC address A description of the problem and the content of pertinent error messages (if any) SOX and COBIT Compliance Suite Quick Start Guide 5
6 About This Guide : Documentation Support Information Documentation Support Information Conventions The LogLogic documentation includes Portable Document Format (PDF) files. To read the PDF documentation, you need a PDF file viewer such as Adobe Acrobat Reader. You can download the Adobe Acrobat Reader at Contact Information Your feedback on the LogLogic documentation is important to us. If you have questions or comments, send to [email protected]. In your message, please indicate the software name and version you are using, as well as the title and document release date of your documentation. Your comments will be reviewed and addressed by the LogLogic Technical Publications team. The LogLogic documentation uses the following conventions to distinguish text and information that might require special attention. Caution: Highlights important situations that could potentially damage data or cause system failure. IMPORTANT! Highlights key considerations to keep in mind. Note: Provides additional information that is useful but not always essential or highlights guidelines and helpful hints. This guide also uses the following typographic conventions to highlight code and command line elements: Monospace is used for programming elements (such as code fragments, objects, methods, parameters, and HTML tags) and system elements (such as file names, directories, paths, and URLs). Monospace bold is used to distinguish system prompts or screen output from user responses, as in this example: username: system home directory: home\app Monospace italic is used for placeholders, which are general names that you replace with names specific to your site, as in this example: LogLogic_home_directory\upgrade\ Straight brackets signal options in command line syntax. ls [-AabCcdFfgiLlmnopqRrstux1] [-X attr] [path...] 6 SOX and COBIT Compliance Suite Quick Start Guide
7 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley CHAPTER 1: LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley This chapter provides a detailed listing of all COBIT 4.1 control objectives with their corresponding Tibco LogLogic compliance suite reports and/or alerts. LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley LogLogic Reports and Alerts Quick Reference LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley The following table lists the reports included in the Tibco LogLogic Compliance Suite: COBIT 4.1 and Sarbanes-Oxley Edition. # LogLogic Report Description 1 COBIT: Accepted VPN Connections - RADIUS 2 COBIT: Account Activities on UNIX Servers 3 4 COBIT: Account Activities on Windows Servers COBIT: Accounts Added to Groups on Windows Servers 5 COBIT: Accounts Changed on NetApp Filer 6 COBIT: Accounts Changed on Sidewinder COBIT: Accounts Changed on TIBCO Administrator COBIT: Accounts Changed on UNIX Servers COBIT: Accounts Changed on Windows Servers 10 COBIT: Accounts Created on NetApp Filer 11 COBIT: Accounts Created on NetApp Filer Audit 12 COBIT: Accounts Created on Sidewinder COBIT: Accounts Created on Symantec Endpoint Protection COBIT: Accounts Created on TIBCO Administrator Displays all users connected to the internal network through the RADIUS VPN. Displays all accounts activities on UNIX servers to ensure authorized and appropriate access. Displays all accounts activities on Windows servers to ensure authorized and appropriate access. Displays all accounts added to groups on the Windows servers to ensure appropriate access. Displays all accounts changed on NetApp Filer to ensure authorized and appropriate access. Displays all accounts changed on Sidewinder to ensure authorized and appropriate access. Displays all accounts changed on TIBCO Administrator to ensure authorized and appropriate access. Displays all accounts changed on UNIX servers to ensure authorized and appropriate access. Displays all accounts changed on Windows servers to ensure authorized and appropriate access. Displays all accounts created on NetApp Filer to ensure authorized and appropriate access. Displays all accounts created on NetApp Filer Audit to ensure authorized and appropriate access. Displays all accounts created on Sidewinder to ensure authorized and appropriate access. Displays all accounts created on Symantec Endpoint Protection to ensure authorized and appropriate access. Displays all accounts created on TIBCO Administrator to ensure authorized and appropriate access. SOX and COBIT Compliance Suite Quick Start Guide 7
8 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 15 COBIT: Accounts Created on UNIX Servers 16 COBIT: Accounts Created on Windows Servers 17 COBIT: Accounts Deleted on NetApp Filer 18 COBIT: Accounts Deleted on NetApp Filer Audit 19 COBIT: Accounts Deleted on Sidewinder COBIT: Accounts Deleted on Symantec Endpoint Protection COBIT: Accounts Deleted on TIBCO Administrator 22 COBIT: Accounts Deleted on UNIX Servers COBIT: Accounts Deleted on Windows Servers COBIT: Accounts Removed from Groups on Windows Servers Displays all accounts created on UNIX servers to ensure authorized and appropriate access. Displays all accounts created on Windows servers to ensure authorized and appropriate access. Displays all accounts deleted on NetApp Filer to ensure authorized and appropriate access. Displays all accounts deleted on NetApp Filer Audit to ensure authorized and appropriate access. Displays all accounts deleted on Sidewinder to ensure authorized and appropriate access. Displays all accounts deleted on Symantec Endpoint Protection to ensure authorized and appropriate access. Displays all accounts deleted on TIBCO Administrator to ensure authorized and appropriate access. Displays all accounts deleted on UNIX servers to ensure authorized and appropriate access. Displays all accounts deleted on Windows servers to ensure authorized and appropriate access. Displays all accounts removed from groups on the Windows servers to ensure appropriate access. 25 COBIT: Active Connections for Cisco ASA Displays all currently active firewall connections for Cisco ASA. 26 COBIT: Active Connections for Cisco Displays all currently active firewall connections for Cisco FWSM. FWSM 27 COBIT: Active Connections for Cisco PIX Displays all currently active firewall connections for Cisco PIX devices. 28 COBIT: Active Directory System Changes Changes made within Active Directory COBIT: Active VPN Connections for Cisco VPN Concentrators COBIT: Active VPN Connections for Nortel Contivity COBIT: Active VPN Connections for RADIUS Displays all currently active VPN connections for Cisco VPN Concentrators. Displays all currently active VPN connections for Nortel Contivity VPN devices. Displays all currently active VPN connections for RADIUS Acct Client. COBIT: Administrator Logins on Windows Displays all logins with the administrator account on Windows servers. 32 Servers 33 COBIT: Allowed URLs by Source IPs Displays successful access to URLs by source IP addresses COBIT: Allowed URLs by Source IPs - F5 BIG-IP TMOS COBIT: Allowed URLs by Source IPs - Microsoft IIS Displays successful access to URLs by source IP addresses on F5 BIG-IP TMOS. Displays successful access to URLs by source IP addresses on Microsoft IIS. 36 COBIT: Allowed URLs by Source Users Displays successful access to URLs by source users. 37 COBIT: Allowed URLs by Source Users - F5 BIG-IP TMOS Displays successful access to URLs by source users on F5 BIG-IP TMOS. 38 COBIT: Allowed URLs by Source Users - Microsoft IIS Displays successful access to URLs by source users on Microsoft IIS. 39 COBIT: Applications Under Attack Displays all applications under attack as well as the attack signatures. 8 SOX and COBIT Compliance Suite Quick Start Guide
9 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Applications Under Attack - Cisco IOS COBIT: Applications Under Attack - ISS SiteProtector COBIT: Applications Under Attack - SiteProtector Displays all applications under attack as well as the attack signatures by Cisco IOS. Displays all applications under attack as well as the attack signatures by ISS SiteProtector. Displays all applications under attack as well as the attack signatures by SiteProtector. 43 COBIT: Attackers by Service Displays all attack source IP address and service ports. 44 COBIT: Attackers by Service - Cisco IOS Displays all attack source IP address and service ports by Cisco IOS. 45 COBIT: Attackers by Service - ISS SiteProtector Displays all attack source IP address and service ports by ISS SiteProtector. 46 COBIT: Attackers by Service - SiteProtector Displays all attack source IP address and service ports by SiteProtector. 47 COBIT: Attackers by Signature Displays all attack source IP address and signatures. 48 COBIT: Attackers by Signature - Cisco IOS Displays all attack source IP address and signatures by Cisco IOS. 49 COBIT: Attackers by Signature - ISS SiteProtector Displays all attack source IP address and signatures by ISS SiteProtector. 50 COBIT: Attackers by Signature - SiteProtector Displays all attack source IP address and signatures by SiteProtector. 51 COBIT: Attacks Detected Displays all IDS attacks detected to servers and applications. 52 COBIT: Attacks Detected - Cisco IOS Displays all IDS attacks detected to servers and applications by Cisco IOS. 53 COBIT: Attacks Detected - ISS SiteProtector Displays all IDS attacks detected to servers and applications by ISS SiteProtector. 54 COBIT: Attacks Detected - SiteProtector Displays all IDS attacks detected to servers and applications by SiteProtector. 55 COBIT: Bandwidth Usage by User Displays users who are using the most bandwidth. 56 COBIT: Blocked URLs by Source IPs Displays URLs that have been blocked by source IP addresses COBIT: Blocked URLs by Source IPs - F5 BIG-IP TMOS COBIT: Blocked URLs by Source IPs - Microsoft IIS Displays URLs that have been blocked by source IP addresses on F5 BIG-IP TMOS. Displays URLs that have been blocked by source IP addresses on Microsoft IIS. 59 COBIT: Blocked URLs by Source Users Displays URLs that have been blocked by source users. 60 COBIT: Blocked URLs by Source Users - F5 BIG-IP TMOS Displays URLs that have been blocked by source users on F5 BIG-IP TMOS. COBIT: Blocked URLs by Source Users - 61 Displays URLs that have been blocked by source users on Microsoft IIS. Microsoft IIS 62 COBIT: Check Point Configuration Changes Displays all Check Point audit events related to configuration changes. 63 COBIT: Check Point Management Station Displays successful logins to the Check Point Management Station. Login 64 COBIT: Check Point Objects Created Displays all Check Point audit events related to object creation in policies. 65 COBIT: Check Point Objects Deleted Displays all Check Point audit events related to policy objects deleted. 66 COBIT: Check Point Objects Modified Displays all Check Point audit events related to policy objects modified. 67 COBIT: Check Point SIC Revoked Displays all Check Point audit events related to the security certificate being revoked. 68 COBIT: Cisco Configuration Changes Changes to Cisco devices via console and TFTP connections. 69 COBIT: Cisco ESA: Attacks by Event ID Displays Cisco ESA attacks by Event ID. 70 COBIT: Cisco ESA: Attacks Detected Displays attacks detected by Cisco ESA SOX and COBIT Compliance Suite Quick Start Guide 9
10 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 71 COBIT: Cisco ESA: Attacks by Threat Name Displays Cisco ESA attacks by threat name. 72 COBIT: Cisco ESA: Scans Scans using Cisco ESA 73 COBIT: Cisco ESA: Updated Updates to Cisco ESA. 74 COBIT: Cisco ISE, ACS Accounts Created 75 COBIT: Cisco ISE, ACS Accounts Removed 76 COBIT: Cisco ISE, ACS Configuration Changes 77 COBIT: Cisco ISE, ACS Password Changes Displays all accounts created on Cisco ISE and Cisco SecureACS to ensure authorized and appropriate access. Displays all accounts removed on Cisco ISE and Cisco SecureACS to ensure authorized and appropriate access. Displays Cisco ISE and Cisco SecureACS configuration changes. Displays all password change activities on Cisco ISE and Cisco SecureACS to ensure authorized and appropriate access. 78 COBIT: Cisco Line Protocol Status Status Displays all Cisco line protocol up and down events. Changes 79 COBIT: Cisco Link Status Changes Displays all Cisco link up and down events 80 COBIT: Cisco Peer Reset/Reload Displays all Cisco Peer reset and reload events COBIT: Cisco Peer Supervisor Status Changes COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco PIX, ASA, FWSM Policy Changed 85 COBIT: Cisco Routers and Switches Restart COBIT: Creation and Deletion of System Level Objects: AIX Audit COBIT: Creation and Deletion of System Level Objects: DB2 Database COBIT: Creation and Deletion of System Level Objects: HP-UX Audit COBIT: Creation and Deletion of System Level Objects: Windows COBIT: Creation and Deletion of System Level Objects: Oracle COBIT: Creation and Deletion of System Level Objects: Solaris BSM COBIT: Creation and Deletion of System Level Objects: SQL Server Displays all Cisco Peer Supervisor status changes. Displays all logs related to disabling Cisco PIX, ASA, and FWSM failover capability. Displays all logs related to performing a Cisco PIX, ASA, and FWSM failover. Displays all configuration changes made to the Cisco PIX, ASA, and FWSM devices. Displays all Cisco routers and switches restart activities to detect unusual activities. Displays AIX audit events related to creation and deletion of system-level objects. Displays DB2 database events related to creation and deletion of system-level objects. Displays HP-UX audit events related to creation and deletion of system-level objects. Displays all Windows events related to creation and deletion of system-level objects. Displays Oracle database events related to creation and deletion of system-level objects. Displays Solaris BSM events related to creation and deletion of system-level objects. Displays Microsoft SQL Server events related to creation and deletion of system-level objects. 93 COBIT: DB2 Database Backup Failed Displays all IBM DB2 Database Server backup failures. COBIT: DB2 Database Configuration Displays DB2 database configuration changes. 94 Changes 95 COBIT: DB2 Database Failed Logins Displays all failed login attempts to review any access violations or unusual activity. 96 COBIT: DB2 Database Logins Displays DB2 database logins. 97 COBIT: DB2 Database Restore Failed Displays all IBM DB2 Database restore failure events. 10 SOX and COBIT Compliance Suite Quick Start Guide
11 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 98 COBIT: DB2 Database Stop and Start Events 99 COBIT: DB2 Database User Additions and Deletions Displays DB2 database events related to starting and stopping the database. Displays IBM DB2 Database events related to creation and deletion of database users. COBIT: Decru DataFort Cryptographic Key Displays events related to cryptographic key handling. 100 Events 101 COBIT: Decru DataFort Zeroization Events Displays events related to Decru DataFort zeroization COBIT: Denied Connections by IP Addresses - Check Point COBIT: Denied Connections by IP Addresses - Cisco ASA COBIT: Denied Connections by IP Addresses - Cisco FWSM COBIT: Denied Connections by IP Addresses - Cisco PIX COBIT: Denied Connections by IP Addresses - Nortel Displays remote IP addresses with the most denied connections from Check Point. Displays remote IP addresses with the most denied connections from Cisco ASA. Displays remote IP addresses with the most denied connections from Cisco FWSM. Displays remote IP addresses with the most denied connections from Cisco PIX. Displays remote IP addresses with the most denied connections from Nortel. 107 COBIT: Denied Connections - Cisco IOS Displays all connections that have been denied by the Cisco IOS devices. 108 COBIT: Denied Connections - Cisco NXOS 109 COBIT: Denied Connections - Cisco Router COBIT: Denied Connections - Cisco Sidewinder COBIT: Denied Connections - Cisco VMware vshield COBIT: Denied Inbound Connections - Cisco ASA COBIT: Denied Inbound Connections - Cisco FWSM COBIT: Denied Inbound Connections - Cisco PIX COBIT: Denied Inbound Connections - Check Point COBIT: Denied Inbound Connections - Juniper Firewall COBIT: Denied Outbound Connections - Cisco ASA COBIT: Denied Outbound Connections - Cisco FWSM COBIT: Denied Outbound Connections - Check Point COBIT: Denied Outbound Connections - Cisco PIX COBIT: Denied Connections - F5 BIG-IP TMOS Displays all connections that have been denied by the Cisco NXOS devices. Displays all connections that have been denied by the Cisco Router devices. Displays the applications that have been denied access the most by the Sidewinder to review access violations. Displays all connections that have been denied by the VMware vshield devices. Displays all inbound connections that have been denied by the Cisco ASA devices. Displays all inbound connections that have been denied by the Cisco FWSM devices. Displays all inbound connections that have been denied by the Cisco PIX devices. Displays all inbound connections that have been denied by the Check Point devices. Displays all inbound connections that have been denied by the Juniper Firewalls. Displays all outbound connections that have been denied by the Cisco ASA devices. Displays all outbound connections that have been denied by the Cisco FWSM. Displays all outbound connections that have been denied by the Check Point. Displays all outbound connections that have been denied by the Cisco PIX devices. Displays all connections that have been denied by the F5 BIG-IP TMOS device. SOX and COBIT Compliance Suite Quick Start Guide 11
12 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Denied Outbound Connections - Juniper Firewall COBIT: Denied VPN Connections - RADIUS COBIT: Domain activities on Symantec Endpoint Protection COBIT: DHCP Granted/Renewed Activities on Microsoft DHCP Displays all outbound connections that have been denied by the Juniper Firewalls. Displays all users denied access to the internal network by the RADIUS VPN. Display all domain activities on Symantec Endpoint Protection. Displays all DHCP Granted/Renewed activities on Microsoft DHCP Server. COBIT: DHCP Granted/Renewed Displays all DHCP Granted/Renewed activities on VMware vshield Edge 126 Activities on VMware vshield 127 COBIT: DNS Server Error Displays all events when DNS Server has errors COBIT: Domains Sending the Most - Exchange 2000/2003 COBIT: Recipients Receiving the Most s by Count - Exchange 2000/ 2003 COBIT: Recipients Receiving the Most s by Count - Exchange 2007/10 COBIT: Recipients Receiving the Most s by Size - Exchange 2000/2003 COBIT: Senders Sending the Most s by Count - Exchange 2000/2003 COBIT: Senders Sending the Most s by Count - Exchange 2007/10 COBIT: Senders Sending the Most s by Size - Exchange 2000/2003 COBIT: Senders Sending the Most s by Size - Exchange 2007/10 COBIT: Source IP Sending To Most Recipients COBIT: Escalated Privilege Activities on Servers COBIT: Escalated Privilege Activities on SOX Servers 139 COBIT: ESX Accounts Activities 140 COBIT: ESX Accounts Created Displays the top domains sending . Displays the recipients who receiving the most s by count. Displays the recipients who receiving the most s by count. Displays the recipients who received the most s by mail size. Displays the senders who sent the most s by count. Displays the senders who sent the most s by count. Displays the senders who sent the most s by mail size. Displays the senders who sent the most s by mail size. Displays IP addresses that are sending to the most recipients using Exchange 2007/10. Displays all privilege escalation activities performed on servers to ensure appropriate access. Displays all privilege escalation activities performed on servers to ensure appropriate access. Displays all accounts activities on VMware ESX servers to ensure authorized and appropriate access. Displays all accounts created on VMware ESX servers to ensure authorized and appropriate access. 141 COBIT: ESX Accounts Deleted Displays all accounts deleted on VMware ESX servers to ensure authorized and appropriate access. 142 COBIT: ESX Failed Logins Failed VMware ESX logins for known user. Displays all group activities on VMware ESX servers to ensure authorized 143 COBIT: ESX Group Activities and appropriate access. 144 COBIT: ESX Kernel log daemon terminating Displays all VMware ESX Kernel log daemon terminating. 145 COBIT: ESX Kernel logging Stop Displays all VMware ESX Kernel logging stops. 12 SOX and COBIT Compliance Suite Quick Start Guide
13 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 146 COBIT: ESX Logins Failed Unknown User Failed VMware ESX logins for unknown user. 147 COBIT: ESX Logins Succeeded Displays successful logins to VMware ESX to ensure only authorized personnel have access. 148 COBIT: ESX Syslogd Restart Displays all VMware ESX syslogd restarts. 149 COBIT: F5 BIG-IP TMOS Login Failed Displays all F5 BIG-IP TMOS Login events which have failed. 150 COBIT: F5 BIG-IP TMOS Login Successful Displays all F5 BIG-IP TMOS Login events which have succeeded. 151 COBIT: F5 BIG-IP TMOS Password Changes Displays all password change activities on F5 BIG-IP TMOS to ensure authorized and appropriate access. 152 COBIT: F5 BIG-IP TMOS Restarted Displays all events when the F5 BIG-IP TMOS has been restarted. 153 COBIT: Failed Logins Displays all failed login attempts to review any access violations or unusual activity. 154 COBIT: Failed Windows Events Summary Displays summary of all failed access-related Windows events. 155 COBIT: Files Accessed on NetApp Filer Audit Displays all files accessed on NetApp Filer Audit to ensure appropriate access. 156 COBIT: Files Accessed on Servers Displays all files accessed on servers to ensure appropriate access. 157 COBIT: Files Accessed through Juniper SSL VPN (Secure Access) 158 COBIT: Files Downloaded via Proxy 159 COBIT: Files Downloaded via Proxy - Microsoft IIS 160 COBIT: Files Downloaded via the Web COBIT: Files Downloaded via the Web - F5 BIG-IP TMOS COBIT: Files Downloaded via the Web - Microsoft IIS 163 COBIT: Files Uploaded via Proxy 164 COBIT: Files Uploaded via Proxy - Microsoft IIS 165 COBIT: Files Uploaded via the Web COBIT: Files Uploaded via the Web - F5 BIG-IP TMOS COBIT: Files Uploaded via the Web - Microsoft IIS Displays all files accessed through Juniper SSL VPN (Secure Access). Displays all proxy-based downloads ensure authorized and appropriate access. Displays all proxy-based downloads to ensure authorized and appropriate access on Microsoft IIS. Displays all web-based downloads ensure authorized and appropriate access. Displays all web-based downloads ensure authorized and appropriate access on F5 BIG-IP TMOS. Displays all web-based downloads ensure authorized and appropriate access on Microsoft IIS. Displays all proxy-based uploads to ensure only authorized data can be uploaded. Displays all proxy-based uploads to ensure only authorized data can be uploaded on Microsoft IIS. Displays all web-based uploads to ensure only authorized data can be uploaded. Displays all web-based uploads to ensure only authorized data can be uploaded on F5 BIG-IP TMOS. Displays all web-based uploads to ensure only authorized data can be uploaded on Microsoft IIS. 168 COBIT: FortiOS: Attacks by Event ID Displays FortiOS attacks by Event ID. 169 COBIT: FortiOS: Attacks by Threat Name Displays FortiOS attacks by threat name. 170 COBIT: FortiOS: Attacks Detected Displays attacks detected by FortiOS 171 COBIT: FortiOS DLP Attacks Detected Display all DLP attacks detected by FortiOS. 172 COBIT: Group Activities on NetApp Filer Audit Displays all group activities on NetApp Filer Audit to ensure authorized and appropriate access. SOX and COBIT Compliance Suite Quick Start Guide 13
14 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 173 COBIT: Group Activities on Symantec Endpoint Protection 174 COBIT: Group Activities on UNIX Servers 175 COBIT: Group Activities on Windows Servers 176 COBIT: Groups Created on UNIX Servers 177 COBIT: Groups Created on Windows Servers 178 COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: Guardium SQL Guard Audit Configuration Changes Displays all group activities on Symantec Endpoint Protection to ensure authorized and appropriate access. Displays all group activities on UNIX servers to ensure authorized and appropriate access. Displays all group activities on Windows servers to ensure authorized and appropriate access. Displays all groups created on UNIX servers to ensure authorized and appropriate access. Displays all group creation activities on Windows servers to ensure appropriate access. Displays all groups deleted on UNIX servers to ensure authorized and appropriate access. Displays all group deletion activities on Windows servers to ensure appropriate access. Displays all configuration changes on the Guardium SQL Guard Audit database. 181 COBIT: Guardium SQL Guard Data Audit Displays all select statements made on Guardium SQL Audit Server. Access 182 COBIT: Guardium SQL Guard Audit Logins Displays all login attempts to the Guardium SQL Server Audit database. 183 COBIT: Guardium SQL Guard Audit Startup or Shutdown Displays all startup and shutdown events on Guardium SQL Audit Server. 184 COBIT: Guardium SQL Guard Displays all configuration changes on the Guardium SQL Guard database. Configuration Changes 185 COBIT: Guardium SQL Guard Data Access Displays all select statements made on Guardium SQL Server. 186 COBIT: Guardium SQL Guard Logins Displays all login attempts to the Guardium SQL Server database COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Access Control List Modifications COBIT: i5/os Audit Configuration Changes 190 COBIT: i5/os DST Password Reset 191 COBIT: i5/os Internet Security Management Events Displays all startup and shutdown events on Guardium SQL Server. Displays i5/os events related to access control list modification. Displays all audit configuration changes on i5/os. Displays i5/os events related to the reset of the DST (Dedicated Service Tools) password. Displays i5/os events related to Internet Security Management (IPSec/ VPN). 192 COBIT: i5/os Key Ring File Events Displays i5/os key ring file events (cryptographic key management). 193 COBIT: i5/os Network Authentication Displays i5/os network authentication events. Events 194 COBIT: i5/os Object Access Displays i5/os events related to object access. 195 COBIT: i5/os Object Creation and Deletion Displays i5/os events related to object creation and deletion. 196 COBIT: i5/os Restore Events Displays i5/os events related to object, program, and profile restoration COBIT: i5/os Server Security User Information Actions COBIT: i5/os System Management Changes Displays i5/os events related to server security user information actions. Displays i5/os events related to system management changes. 14 SOX and COBIT Compliance Suite Quick Start Guide
15 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 199 COBIT: i5/os User Profile Creation, Modification, or Restoration Displays i5/os events related to user profile creation, modification or restoration. 200 COBIT: Juniper Firewall Escalated Privilege Displays events related to users having escalated privileges in the Juniper Firewall. 201 COBIT: Juniper Firewall Policy Changed Displays all configuration changes to the Juniper Firewall policies. 202 COBIT: Juniper Firewall Reset Accepted Displays events that indicate the Juniper Firewall has been reset to its factory default state. 203 COBIT: Juniper Firewall Reset Imminent Displays events that indicate the Juniper Firewall will be reset to its factory default state. 204 COBIT: Juniper Firewall Restarted Displays all Juniper Firewall restart events. 205 COBIT: Juniper Firewall VPN Tunnel Status Change Displays events when the Juniper Firewall VPN Tunnel is setup or taken down. 206 COBIT: Juniper SSL VPN Successful Logins Displays successful connections through the Juniper SSL VPN COBIT: Juniper SSL VPN (Secure Access) Policy Changed COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Last Activity Performed by Administrators COBIT: Last Activity Performed by All Users Displays all configuration changes to the Juniper SSL VPN (Secure Access) policies. Displays successful connections through the Juniper SSL VPN (Secure Access). Displays the latest activities performed by administrators and root users to ensure appropriate access. Displays the latest activities performed by all users to ensure appropriate access. 211 COBIT: Logins by Authentication Type Displays all logins categorized by the authentication type. 212 COBIT: LogLogic DSM Configuration Displays all configuration changes on the LogLogic DSM database. Changes 213 COBIT: LogLogic DSM Data Access Displays all select statements made on LogLogic DSM database. 214 COBIT: LogLogic DSM Logins Displays all login attempts to the LogLogic DSM database. 215 COBIT: LogLogic DSM Startup or Shutdown 216 COBIT: LogLogic File Retrieval Errors 217 COBIT: LogLogic Message Routing Errors COBIT: McAfee AntiVirus: Attacks by Event ID COBIT: McAfee AntiVirus: Attacks by Threat Name COBIT: McAfee AntiVirus: Attacks Detected COBIT: Microsoft Operations Manager - Failed Windows Events COBIT: Microsoft Operations Manager - Windows Account Activities COBIT: Microsoft Operations Manager - Windows Accounts Changed Displays all startup and shutdown events on LogLogic DSM database. Displays all errors while retrieving log files from devices, servers and applications. Displays all log forwarding errors on the LogLogic Appliance to ensure all logs are archived properly. McAfee AntiVirus attacks by Event ID. Displays McAfee AntiVirus attacks by threat name. McAfee AntiVirus attacks Detected. Displays summary of all failed access-related Windows events. Displays all accounts activities on Windows servers to ensure authorized and appropriate access. Displays all accounts changed on Windows servers to ensure authorized and appropriate access. SOX and COBIT Compliance Suite Quick Start Guide 15
16 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Microsoft Operations Manager - Windows Accounts Created COBIT: Microsoft Operations Manager - Windows Accounts Enabled COBIT: Microsoft Operations Manager - Windows Events by Users COBIT: Microsoft Operations Manager - Windows Events Summary COBIT: Microsoft Operations Manager - Windows Password Changes COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft Operations Manager - Windows Policies Modified COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updates COBIT: Microsoft Sharepoint Permissions Changed COBIT: Microsoft Sharepoint Policy Add, Remove, or Modify Displays all accounts created on Windows servers to ensure authorized and appropriate access. Displays all accounts enabled on Windows servers to ensure authorized and appropriate access. Displays a summary of access-related Windows events by source and target users. Displays a summary of access-related Windows events by count. Displays all password change activities on Windows servers to ensure authorized and appropriate access. Displays all permission modification activities on Windows servers to ensure authorized access. Displays all policy modification activities on Windows servers to ensure authorized and appropriate access. Displays all Windows server restart activities to detect unusual activities. Displays all events when content has been deleted from Microsoft Sharepoint. Displays all events when content is updated within Microsoft Sharepoint. Displays all delete and update events to Microsoft Sharepoint user/group permissions. Displays all events when a Microsoft Sharepoint policy is added, removed, or modified. 236 COBIT: Microsoft SQL Server Backup Failed Displays all Microsoft SQL Server backup failures. COBIT: Microsoft SQL Server Configuration Displays Microsoft SQL database configuration changes. 237 Changes 238 COBIT: Microsoft SQL Server Data Access Displays data access events on Microsoft SQL Server databases COBIT: Microsoft SQL Server Database Failed Logins COBIT: Microsoft SQL Server Database Logins COBIT: Microsoft SQL Server Database Permission Events COBIT: Microsoft SQL Server Database User Additions and Deletions COBIT: Microsoft SQL Server Password Changes Displays failed Microsoft SQL Server database logins. Displays logins to Microsoft SQL Server databases. Displays events related to Microsoft SQL Server database permission modifications. Displays Microsoft SQL Server events related to creation and deletion of database users. Displays password changes for Microsoft SQL Server database accounts. 244 COBIT: Microsoft SQL Server Restore Failed Displays all Microsoft SQL Server restore failure events COBIT: Microsoft SQL Server Schema Corruption COBIT: Microsoft SQL Server Shutdown by Reason COBIT: Most Active Senders - Exchange 2000/2003 Displays all schema corruption events on Microsoft SQL Server databases. Displays all Microsoft SQL Server shutdown events by reason. Displays the most active senders based on activity. 16 SOX and COBIT Compliance Suite Quick Start Guide
17 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Most Active Ports Through Firewall - Check Point COBIT: Most Active Ports Through Firewall - Cisco ASA COBIT: Most Active Ports Through Firewall - Cisco FWSM COBIT: Most Active Ports Through Firewall - Cisco PIX COBIT: Most Active Ports Through Firewall - Fortinet COBIT: Most Active Ports Through Firewall - Juniper Firewall COBIT: Most Active Ports Through Firewall - Nortel COBIT: Most Used Mail Commands - Exchange 2000/2003 Displays the most active ports used through the Check Point firewall. Displays the most active ports used through the Cisco ASA firewall. Displays the most active ports used through the Cisco FWSM firewall. Displays the most active ports used through the Cisco PIX firewall. Displays the most active ports used through the Fortinet firewall. Displays the most active ports used through the Juniper firewall. Displays the most active ports used through the Nortel firewall. Displays the most used protocol commands on Microsoft Exchange servers. 256 COBIT: NetApp Filer Audit Logs Cleared Displays all audit logs clearing activities on NetApp Filer Audit to detect access violations or unusual activity. 257 COBIT: NetApp Filer Audit Login Failed Displays all NetApp Filer Audit Login events which have failed COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer Audit Policies Modified Displays all NetApp Filer Audit Login events which have succeeded. Displays all policy modification activities on NetApp Filer Audit to ensure authorized and appropriate access. 260 COBIT: NetApp Filer Snapshot Error Displays all backup errors that have occurred on the NetApp Filer servers. 261 COBIT: NetApp Filer File activity Display all file activities on NetApp Filer. 262 COBIT: NetApp Filer Login Failed Displays all NetApp Filer Login events which have failed. 263 COBIT: NetApp Filer Login Successful Displays all NetApp Filer Login events which have succeeded. 264 COBIT: NetApp Filer Password Changes COBIT: Network Traffic per Rule - Check Point COBIT: Network Traffic per Rule - Juniper Firewall 267 COBIT: Network Traffic per Rule - Nortel Displays all password change activities on NetApp Filer to ensure authorized and appropriate access. Displays all network traffic flowing through each rule in a network policy to ensure appropriate access. Displays all network traffic flowing through each rule in a network policy to ensure appropriate access. Displays all network traffic flowing through each rule in a network policy to ensure appropriate access. 268 COBIT: Oracle Database Configuration Displays Oracle database configuration changes. Changes 269 COBIT: Oracle Database Data Access Displays data access events on Oracle databases. 270 COBIT: Oracle Database Failed Logins Displays all failed login attempts to the Oracle database. 271 COBIT: Oracle Database Logins Displays Oracle database logins. 272 COBIT: Oracle Database Permission Events Displays events related to Oracle Server database role and privilege management. 273 COBIT: Oracle Database Shutdown Displays Oracle database events related to shutting down the server. SOX and COBIT Compliance Suite Quick Start Guide 17
18 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 274 COBIT: Oracle Database User Additions and Deletions Displays Oracle database events related to creation and deletion of database users. 275 COBIT: PANOS: Attacks by Event ID Displays Palo Alto Networks attacks by Event ID. 276 COBIT: PANOS: Attacks by Threat Name Displays Palo Alto Networks attacks by threat name. 277 COBIT: PANOS: Attacks Detected Displays attacks detected by Palo Alto Networks. 278 COBIT: Password Changes on Windows Servers 279 COBIT: Peer Servers and Status 280 COBIT: Peer Servers and Status - Microsoft IIS 281 COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Permissions Modified on Windows Servers COBIT: Policies Modified on Windows Servers Displays all password change activities on Windows servers to ensure authorized and appropriate access. Displays all web servers providing data for cache servers and the status of requests. Displays all web servers providing data for cache servers and the status of requests on Microsoft IIS. Displays all review activities performed by administrators to ensure review for any access violations. Displays all review activities performed by administrators to ensure review for any access violations. Displays all permission modification activities on Windows Servers to ensure authorized access. Displays all policy modification activities on Windows servers to ensure authorized and appropriate access. 285 COBIT: Ports Allowed Access - Check Point Displays all connections passed through the Check Point by port. 286 COBIT: Ports Allowed Access - Cisco ASA Displays all connections passed through the Cisco ASA by port. 287 COBIT: Ports Allowed Access - Cisco IOS Displays all connections passed through the Cisco IOS by port. 288 COBIT: Ports Allowed Access - Cisco FWSM Displays all connections passed through the Cisco FWSM by port. COBIT: Ports Allowed Access - Cisco Displays all ports allowed access through Cisco Netflow. 289 Netflow 290 COBIT: Ports Allowed Access - Cisco PIX Displays all connections passed through the Cisco PIX by port. 291 COBIT: Ports Allowed Access - F5 BIG-IP TMOS Displays all connections passed through the F5 BIG-IP TMOS by port. 292 COBIT: Ports Allowed Access - Fortinet Displays all connections passed through the Fortinet by port COBIT: Ports Allowed Access - Juniper Firewall COBIT: Ports Allowed Access - Juniper JunOS Displays all connections passed through the Juniper Firewall by port. Displays all connections passed through the Juniper JunOS by port. 295 COBIT: Ports Allowed Access - Juniper RT Displays all connections passed through the Juniper RT Flow by port. Flow 296 COBIT: Ports Allowed Access - Nortel Displays all connections passed through the Nortel by port. 297 COBIT: Ports Allowed Access - PANOS Displays all connections passed through the Palo Alto Networks by port. 298 COBIT: Ports Allowed Access - VMware vshield 299 COBIT: Ports Denied Access - Check Point 300 COBIT: Ports Denied Access- Cisco ASA Displays all ports allowed access through VMware vshield. Displays the ports that have been denied access the most by the Check Point to review access violations. Displays the ports that have been denied access the most by the Cisco ASA to review access violations. 18 SOX and COBIT Compliance Suite Quick Start Guide
19 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 301 COBIT: Ports Denied Access- Cisco FWSM 302 COBIT: Ports Denied Access - Cisco IOS 303 COBIT: Ports Denied Access- Cisco PIX 304 COBIT: Ports Denied Access - Cisco Router 305 COBIT: Ports Denied Access - F5 BIG-IP TMOS 306 COBIT: Ports Denied Access - Fortinet COBIT: Ports Denied Access - Juniper Firewall COBIT: Ports Denied Access - Juniper JunOS COBIT: Ports Denied Access - Juniper RT Flow 310 COBIT: Ports Denied Access - Nortel 311 COBIT: Ports Denied Access - PANOS 312 COBIT: Ports Denied Access - VMware vshield 313 COBIT: RACF Accounts Created Displays the ports that have been denied access the most by the Cisco FWSM to review access violations. Displays the ports that have been denied access the most by the Cisco IOS to review access violations. Displays the ports that have been denied access the most by the Cisco PIX to review access violations. Displays the ports that have been denied access the most by the Cisco Router to review access violations. Displays the ports that have been denied access the most by the F5 BIG-IP TMOS to review access violations. Displays the ports that have been denied access the most by the Fortinet to review access violations. Displays the ports that have been denied access the most by the Juniper Firewall to review access violations. Displays the applications that have been denied access the most by the Juniper JunOS. Displays the ports that have been denied access the most by the Juniper RT Flow to review access violations. Displays the ports that have been denied access the most by the Nortel to review access violations. Displays the ports that have been denied access the most by the Palo Alto Networks to review access violations. Displays the ports that have been denied access the most by the VMware vshield to review access violations. Displays all accounts created on RACF servers to ensure authorized and appropriate access. 314 COBIT: RACF Accounts Deleted Displays all accounts deleted on RACF servers to ensure authorized and appropriate access. 315 COBIT: RACF Accounts Modified Displays all events when a network user profile has been modified. 316 COBIT: RACF Failed Logins Displays all failed login attempts to review any access violations or unusual activity. 317 COBIT: RACF Files Accessed Displays all files accessed on RACF servers to ensure appropriate access. 318 COBIT: RACF Password Changed Displays all password change activities on RACF servers to ensure authorized and appropriate access. 319 COBIT: RACF Permissions Changed Displays all permission modification activities on RACF to ensure authorized access. 320 COBIT: RACF Process Started Displays all processes started on the RACF servers. 321 COBIT: RACF Successful Logins 322 COBIT: Recipient Domains Experiencing Delay - Exchange 2000/ COBIT: Root Logins Displays root logins. Displays successful logins to ensure only authorized personnel have access. Displays the recipient domains that have experienced the most delivery delays. COBIT: Sender and Recipients Exchanging Displays the top sender and recipient combinations. 324 the Most s - Exchange 2000/ COBIT: Sensors Generating Alerts Displays the IDS sensors that generated the most alerts. SOX and COBIT Compliance Suite Quick Start Guide 19
20 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Sensors Generating Alerts - Cisco IOS COBIT: Sensors Generating Alerts - ISS SiteProtector Displays the sensors generating alerts on Cisco IOS. Displays the IDS sensors that generated the most alerts by ISS SiteProtector. 328 COBIT: Sensors Generating Alerts - SiteProtector Displays the IDS sensors that generated the most alerts by SiteProtector. 329 COBIT: Servers Under Attack Displays all servers under attack. 330 COBIT: Servers Under Attack - Cisco IOS Displays all servers under attack through Cisco IOS COBIT: Servers Under Attack - ISS SiteProtector COBIT: Servers Under Attack - SiteProtector Displays all servers under attack by ISS SiteProtector. Displays all servers under attack by SiteProtector. 333 COBIT: Source IP Sending To Most Displays IP addresses that are sending to the most recipients. Recipients - Exchange 2000/ COBIT: Source of Attacks Displays the sources that have initiated the most attacks. 335 COBIT: Source of Attacks - Cisco IOS Displays all sources of attacks against Cisco IOS. 336 COBIT: Source of Attacks - ISS SiteProtector Displays the sources that have initiated the most attacks by ISS SiteProtector. 337 COBIT: Source of Attacks - SiteProtector Displays the sources that have initiated the most attacks by SiteProtector. 338 COBIT: Successful Logins 339 COBIT: Sybase ASE Database Backup and Restoration Displays successful logins to ensure only authorized personnel have access. Displays Sybase ASE DUMP and LOAD events. 340 COBIT: Sybase ASE Database Configuration Displays configuration changes to the Sybase database. Changes 341 COBIT: Sybase ASE Database Create Events Displays Sybase ASE events involving the CREATE statement. 342 COBIT: Sybase ASE Database Data Access Displays Sybase ASE events involving the SELECT statement. 343 COBIT: Sybase ASE Database Drop Events Displays Sybase ASE events involving the DROP statement COBIT: Sybase ASE Database Startup or Shutdown COBIT: Sybase ASE Database User Additions and Deletions Displays all startup and shutdown events for the Sybase database. Displays Sybase database events related to creation and deletion of database users. 346 COBIT: Sybase ASE Failed Logins Displays failed Sybase ASE database logins. 347 COBIT: Sybase ASE Successful Logins Displays successful Sybase ASE database logins. 348 COBIT: Symantec AntiVirus: Attacks by Threat Name Displays Symantec AntiVirus attacks by threat name. 349 COBIT: Symantec AntiVirus: Attacks Displays attacks detected by Symantec AntiVirus. Detected 350 COBIT: Symantec AntiVirus: Scans Displays scans using Symantec AntiVirus. 351 COBIT: Symantec AntiVirus: Updated Displays updates to Symantec AntiVirus COBIT: Symantec Endpoint Protection: Attacks by Threat Name COBIT: Symantec Endpoint Protection: Attacks Detected Displays Symantec Endpoint Protection attacks by threat name. Attacks Detected by Symantec Endpoint Protection. 20 SOX and COBIT Compliance Suite Quick Start Guide
21 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Symantec Endpoint Protection Configuration Changes COBIT: Symantec Endpoint Protection Password Changes COBIT: Symantec Endpoint Protection Policy Add, Remove, or Modify COBIT: Symantec Endpoint Protection: Scans COBIT: Symantec Endpoint Protection: Updated COBIT: TIBCO Administrator Password Changes COBIT: TIBCO Administrator Permission Changes COBIT: TrendMicro Control Manager: Attacks Detected COBIT: TrendMicro Control Manager: Attacks Detected by Threat Name COBIT: TrendMicro OfficeScan: Attacks Detected COBIT: TrendMicro OfficeScan: Attacks Detected by Threat Name COBIT: Tripwire Modifications, Additions, and Deletions COBIT: Trusted Domain Created on Windows Servers COBIT: Trusted Domain Deleted on Windows Servers Displays Symantec Endpoint Protection configuration changes Displays all password change activities on Symantec Endpoint Protection to ensure authorized and appropriate access Displays all events when a Symantec Endpoint Protection policy is added, removed, or modified Displays scans using Symantec Endpoint Protection. Displays updates to Symantec Endpoint Protection. Displays all password change activities on TIBCO Administrator to ensure authorized and appropriate access. Displays events related to TIBCO Administrator permission modifications. Displays attacks detected by TrendMicro Control Manager. Displays attacks detected by TrendMicro Control Manager by threat name. Displays attacks detected by TrendMicro OfficeScan. Displays attacks detected by TrendMicro OfficeScan by threat name. Displays system modifications, additions, and deletions detected by Tripwire. Displays all trusted domains created on Windows servers to ensure authorized and appropriate access. Displays all trusted domains deleted on Windows servers to ensure authorized and appropriate access. 368 COBIT: Unauthorized Logins Displays all logins from unauthorized users to ensure appropriate access to data. 369 COBIT: Unencrypted Logins Displays all unencrypted logins to ensure secure access to data COBIT: Unencrypted Network Services - Check Point COBIT: Unencrypted Network Services - Cisco ASA COBIT: Unencrypted Network Services - Cisco FWSM COBIT: Unencrypted Network Services - Cisco IOS COBIT: Unencrypted Network Services - Cisco Netflow COBIT: Unencrypted Network Services - Cisco PIX COBIT: Unencrypted Network Services - F5 BIG-IP TMOS COBIT: Unencrypted Network Services - Fortinet Displays Check Point firewall traffic containing unencrypted network services. Displays Cisco ASA firewall traffic containing unencrypted network services. Displays Cisco FWSM firewall traffic containing unencrypted network services. Displays Cisco IOS firewall traffic containing unencrypted network services. Displays Cisco Netflow traffic containing unencrypted network services. Displays Cisco PIX firewall traffic containing unencrypted network services. Displays F5 BIG-IP TMOS firewall traffic containing unencrypted network services. Displays Fortinet firewall traffic containing unencrypted network services. SOX and COBIT Compliance Suite Quick Start Guide 21
22 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Unencrypted Network Services - Juniper Firewall COBIT: Unencrypted Network Services - Juniper JunOS COBIT: Unencrypted Network Services - Juniper RT Flow COBIT: Unencrypted Network Services - Nortel COBIT: Unencrypted Network Services - PANOS COBIT: Unencrypted Network Services - Sidewinder COBIT: Unencrypted Network Services - VMware vshield Displays Juniper firewall traffic containing unencrypted network services. Displays Juniper JunOS firewall traffic containing unencrypted network services. Displays Juniper RT Flow firewall traffic containing unencrypted network services. Displays Nortel firewall traffic containing unencrypted network services. Displays Palo Alto Networks firewall traffic containing unencrypted network services. Displays Sidewinder firewall traffic containing unencrypted network services. Displays VMware vshield firewall traffic containing unencrypted network services. 385 COBIT: UNIX Failed Logins Failed UNIX logins for known and unknown users. 386 COBIT: Users Created on Servers Displays all users created on servers to ensure authorized and appropriate access. 387 COBIT: Users Removed from Servers Displays all users removed from servers to ensure timely removal of terminated users. 388 COBIT: Users Using the Proxies Displays users who have been surfing the web through the proxy servers. 389 COBIT: Users Using the Proxies - Microsoft IIS Displays users who have been surfing the web through the proxy servers on Microsoft IIS. 390 COBIT: vcenter Change Attributes Modification of VMware vcenter and VMware ESX properties. 391 COBIT: vcenter Data Move Entity has been moved within the VMware vcenter Infrastructure. 392 COBIT: vcenter Datastore Events Displays create, modify, and delete datastore events on VMware vcenter. 393 COBIT: vcenter Failed Logins Failed logins to the VMware vcenter console. 394 COBIT: vcenter Modify Firewall Policy Displays changes to the VMware ESX allowed services firewall policy COBIT: vcenter Orchestrator Change Attributes COBIT: vcenter Orchestrator Datastore Events Modification of VMware vcenter Orchestrator properties. Displays create, modify, and delete datastore events on VMware vcenter Orchestrator. 397 COBIT: vcenter Orchestrator Data Move Entity has been moved within the VMware vcenter Orchestrator Infrastructure. 398 COBIT: vcenter Orchestrator Failed Logins Display all failed logins for VMWare vcenter Orchestrator COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Orchestrator vswitch Added, Changed or Removed Virtual machine has been created from VMware vcenter Orchestrator. Virtual machine has been deleted from VMware vcenter Orchestrator. Virtual machine has been shutdown or paused from VMware vcenter Orchestrator console. Virtual machine has been started or resumed from VMware vcenter Orchestrator console. vswitch has been added, modified or removed from VMware vcenter Orchestrator console. 404 COBIT: vcenter Resource Usage Change Resources have changed on VMware vcenter. 22 SOX and COBIT Compliance Suite Quick Start Guide
23 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description 405 COBIT: vcenter Restart ESX Services VMware vcenter restarted services running on VMware ESX Server. 406 COBIT: vcenter Shutdown or Restart of ESX Server VMware ESX Server is shutdown or restarted from VMware vcenter console. 407 COBIT: vcenter Successful Logins Successful logins to the VMware vcenter console. 408 COBIT: vcenter User Permission Change A permission role has been added, changed, removed, or applied to a user on VMware vcenter server. 409 COBIT: vcenter Virtual Machine Created Virtual machine has been created from VMware vcenter console. 410 COBIT: vcenter Virtual Machine Deleted 411 COBIT: vcenter Virtual Machine Shutdown 412 COBIT: vcenter Virtual Machine Started 413 COBIT: vcenter vswitch Changed or Removed Virtual machine has been deleted or removed from VMware vcenter console. Virtual machine has been shutdown or paused from VMware vcenter console. Virtual machine has been started or resumed from VMware vcenter console. vswitch on VMware ESX server has been modified or removed from the VMware vcenter console. 414 COBIT: vcloud Failed Logins Failed logins to the VMware vcloud Director console. 415 COBIT: vcloud Organization Created VMware vcloud Director organization created events. 416 COBIT: vcloud Organization Deleted VMware vcloud Director organization deleted events. 417 COBIT: vcloud Organization Modified VMware vcloud Director organization modified events. 418 COBIT: vcloud Successful Logins Successful logins to the VMware vcloud Director console. 419 COBIT: vcloud User Created VMware vcloud Director user created events. 420 COBIT: vcloud User Deleted or Removed COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete VMware vcloud Director users have been deleted or removed from the system. VMware vcloud Director vapp created, deleted, and modified events. VMware vcloud Director virtual datacenter created, modified, or deleted events. 423 COBIT: VPN Connection Average Displays the average bandwidth for VPN connections. Bandwidth 424 COBIT: VPN Connection Average Duration Displays the average duration of VPN connections. 425 COBIT: VPN Connections by Users Displays users who are made the most connections 426 COBIT: VPN Denied Connections by Users Displays users with the most denied connections. 427 COBIT: VPN Connection Disconnect Displays the disconnect reasons for VPN connections. Reasons 428 COBIT: VPN Sessions by Destination IPs Displays all VPN sessions categorized by destination IP addresses. 429 COBIT: VPN Sessions by Source IPs Displays all VPN sessions categorized by source IP addresses. 430 COBIT: VPN Sessions by Users Displays all VPN sessions categorized by authenticated users COBIT: VPN Users Accessing Corporate Network COBIT: vshield Edge Configuration Changes 433 COBIT: Web Access from All Users Displays all users logging into the corporate network via Virtual Private Network to ensure appropriate access. Displays changes to VMware vshield Edge policies. Displays all web-based access by all users for regular reviews and updates. SOX and COBIT Compliance Suite Quick Start Guide 23
24 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Reports for COBIT 4.1 and Sarbanes-Oxley # LogLogic Report Description COBIT: Web Access from All Users - F5 BIG-IP TMOS COBIT: Web Access from All Users - Microsoft IIS 436 COBIT: Web Access to Applications COBIT: Web Access to Applications - F5 BIG-IP TMOS COBIT: Web Access to Applications - Microsoft IIS Displays all web-based access by all users for regular reviews and updates on F5 BIG-IP TMOS Displays all web-based access by all users for regular reviews and updates on Microsoft IIS Displays all web-based access to applications to ensure appropriate and authorized access. Displays all web-based access to applications to ensure appropriate and authorized access on F5 BIG-IP TMOS. Displays all web-based access to applications to ensure appropriate and authorized access on Microsoft IIS. 439 COBIT: Web URLs Visited Displays URLs that have been visited. 440 COBIT: Web URLs Visited - F5 BIG-IP TMOS Displays URLs that have been visited on F5 BIG-IP TMOS. 441 COBIT: Web URLs Visited - Microsoft IIS Displays URLs that have been visited on Microsoft IIS. 442 COBIT: Web URLs Visited via Proxy Displays URLs that have been visited via a proxy server. 443 COBIT: Web URLs Visited via Proxy - Microsoft IIS 444 COBIT: Windows Accounts Enabled 445 COBIT: Windows Audit Logs Cleared Displays URLs that have been visited via a proxy server on Microsoft IIS. Displays all accounts enabled on Windows servers to ensure authorized and appropriate access. Displays all audit logs clearing activities on Windows servers to detect access violations or unusual activity. 446 COBIT: Windows Events by Users Displays a summary of access-related Windows events by source and target users. 447 COBIT: Windows Events Summary Displays a summary of access-related Windows events by count. 448 COBIT: Windows New Services Installed Displays a list of new services installed on Windows servers to ensure authorized access. 449 COBIT: Windows Programs Accessed Displays all programs started and stopped on servers to ensure appropriate access. 450 COBIT: Windows Servers Restarted Displays all Windows server restart activities to detect unusual activities. 451 COBIT: Windows Update Events Displays all Windows update events. 452 COBIT: Windows Update Failures Displays all Windows update failure events. 453 COBIT: Windows Update Successful Events Displays all successful Windows update events. 24 SOX and COBIT Compliance Suite Quick Start Guide
25 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley The following table lists the alerts included in the LogLogic Compliance Suite: COBIT 4.1 and Sarbanes-Oxley Edition. # LogLogic Alert Description 1 COBIT: Accounts Created Alert when a new account is created on servers. 2 COBIT: Accounts Deleted Alert when an account is deleted on servers. 3 COBIT: Accounts Enabled Alert when an account has been enabled on servers. 4 COBIT: Accounts Locked Alert when an account has been locked on servers. 5 COBIT: Accounts Modified Alert when an account is modified on servers. 6 COBIT: Active Directory Changes Alert when changes are made within Active Directory. 7 COBIT: Allowed Connections Allowed firewall connections. 8 COBIT: Check Point Policy Changed Alert when a Check Point firewall's policy has been modified COBIT: Cisco ISE, ACS Configuration Changed Alert when configuration changes are made to the Cisco ISE or Cisco SecureACS. COBIT: Cisco ISE, ACS Passwords Changed Alert when a user changes their password via Cisco ISE or Cisco SecureACS. 11 COBIT: Cisco PIX, ASA, FWSM Commands Alert when a Cisco PIX, ASA, and FWSM commands are executed. Executed 12 COBIT: Cisco PIX, ASA, FWSM Restarted The Cisco PIX, ASA or FWSM device has been restarted COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Errors COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco PIX, ASA, FWSM Fragment Database Limit COBIT: Cisco PIX, ASA, FWSM Logon Failure COBIT: Cisco PIX, ASA, FWSM Logon Success COBIT: Cisco PIX, ASA, FWSM NAT Failure COBIT: Cisco PIX, ASA, FWSM Policy Changed COBIT: Cisco PIX, ASA, FWSM Privilege Escalated COBIT: Cisco PIX, ASA, FWSM Protocol Failure COBIT: Cisco PIX, ASA, FWSM Routing Failure COBIT: Cisco PIX, ASA, FWSM Shun Added COBIT: Cisco PIX, ASA, FWSM Shun Deleted COBIT: Cisco PIX, ASA, FWSM VPN Tunnel Creation The Cisco PIX, ASA or FWSM failover configuration has been disabled. Alert when an error has occurred during PIX, ASA, or FWSM failover Alert when a failover has occurred on the Cisco PIX, ASA, or FWSM devices The fragment database count has been reached. Login failure attempts to the Cisco PIX, ASA and FWSM Firewall. Successful login attempts to the Cisco PIX, ASA and FWSM Firewall. Failures in Network Address Translation (NAT) on the Cisco PIX, ASA and FWSM. Alert when a Cisco PIX, ASA, or FWSM firewall policy has been modified. A logged in user has executed the enable command. Possible network protocol failures on the Cisco PIX, ASA and FWSM firewall. Alert when routing failure occurred in the Cisco PIX, ASA, or FWSM devices. Alert when a shun rule has been added to the PIX, ASA, or FWSM configuration. Alert when a shun rule has been removed from the PIX, ASA, or FWSM configuration. A VPN tunnel has been created on the Cisco PIX, ASA and FWSM firewall. SOX and COBIT Compliance Suite Quick Start Guide 25
26 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley # LogLogic Alert Description 27 COBIT: Cisco PIX, ASA, FWSM VPN Tunnel Teardown A VPN tunnel has been removed on the Cisco PIX, ASA and FWSM firewall. 28 COBIT: Cisco Switch Card Insert Alert when a card module is inserted into a switch. 29 COBIT: Cisco Switch Device Reload Alert when a command to reload a Cisco switch has been executed. 30 COBIT: Cisco Switch Device Restart Alert when a router or switch has been rebooted. 31 COBIT: Cisco Switch HA Failure (ver) Alert when a HA setup has version incompatibility issues. 32 COBIT: Cisco Switch Interface Change Alert when network interfaces are going up or down. 33 COBIT: Cisco Switch Interface Down Alert when network interfaces are going down. 34 COBIT: Cisco Switch Interface Up Alert when network interfaces are going up. 35 COBIT: Cisco Switch Policy Changed Alert when Cisco router or switch configuration has been modified. 36 COBIT: DB2 Database Backup Failed Alert when a DB2 database backup fails. 37 COBIT: DB2 Database Configuration Alert when a configuration is changed on a DB2 database. Change 38 COBIT: DB2 Database Restore Failed Alert when a database restore fails on a DB2 database. 39 COBIT: DB2 Database Started or Stopped Alert when a DB2 database is started or stopped. 40 COBIT: DB2 Database User Added or Alert when a user is added or dropped from a DB2 database. Dropped 41 COBIT: Disallowed Services Disallowed firewall services. 42 COBIT: DNS Server Shutdown Alert when DNS Server has been shutdown. 43 COBIT: DNS Server Started Alert when DNS Server has been started. 44 COBIT: Excessive IDS Attack IDS anomalies using message volume threshold alerts. 45 COBIT: Guardium SQL Guard Config Alert when a configuration is changed on Guardium SQL Database. Changes 46 COBIT: Guardium SQL Guard Data Access Alert when a select statement is made on Guardium SQL Database. 47 COBIT: Guardium SQL Guard Logins Alert when a user logs into the Guardium SQL Database. 48 COBIT: Guardium SQL Guard Startup or Alert when the Guardium SQL Database is started or stopped. Shutdown 49 COBIT: Groups Created Alert when new user groups are created. 50 COBIT: Groups Deleted Alert when a user group is deleted. 51 COBIT: Group Members Added Alert when new members are added to user groups. 52 COBIT: Group Members Deleted Alert when members are removed from user groups. 53 COBIT: i5/os Network Profile Changes Alerts when any changes are made to an i5/os network profile. 54 COBIT: i5/os Permission or Policy Change Alerts when policies or permissions are changed on the i5/os. 55 COBIT: i5/os Software Updates Alert when events related to the i5/os software updates. 56 COBIT: i5/os Server or Service Status Alerts when the i5/os is restarted or a service stops or starts. Change 57 COBIT: i5/os User Profile Changes Alerts when a user profile is changed on the i5/os. 58 COBIT: IBM AIX Password Changed Alert when an account password is changed on IBM AIX servers. 59 COBIT: Juniper Firewall HA State Change Alert when Juniper Firewall has changed its failover state. 60 COBIT: Juniper Firewall Logon Failure Login failure attempts to the Juniper Firewall. 61 COBIT: Juniper Firewall Logon Success Successful login attempts to the Juniper Firewall. 62 COBIT: Juniper Firewall Peer Missing Alert when a Juniper Firewall HA peer is missing. 63 COBIT: Juniper Firewall Policy Changes Alert when Juniper Firewall configuration is changed. 64 COBIT: Juniper Firewall System Reset Alert when the Juniper firewall has been reset to system default. 26 SOX and COBIT Compliance Suite Quick Start Guide
27 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley # LogLogic Alert Description 65 COBIT: Juniper Policy Out of Sync Alert when the Juniper Firewall's policy is out of sync. 66 COBIT: Juniper VPN Policy Change Alerts on changes to Juniper VPN system or configuration. 67 COBIT: Logins Failed Alert when login failures are over the defined threshold. 68 COBIT: Logins Succeeded Alert when successful logins are over the defined threshold. 69 COBIT: LogLogic Disk Full Alert when the LogLogic disk storage space has run out. 70 COBIT: LogLogic DSM Configuration Alert when a configuration is changed on LogLogic DSM database. Changes 71 COBIT: LogLogic DSM Data Access Alert when a select statement is made on LogLogic DSM database. 72 COBIT: LogLogic DSM Logins Alert when a user logs into the LogLogic DSM database. 73 COBIT: LogLogic DSM Startup or Alert when the LogLogic DSM database is started or stopped. Shutdown 74 COBIT: LogLogic Message Routing Errors Alert when problems are detected during message forwarding. 75 COBIT: LogLogic File Retrieval Errors Alert when problems are detected during log file retrieval COBIT: Microsoft Operations Manager - Permissions Changed COBIT: Microsoft Operations Manager - Windows Passwords Changed COBIT: Microsoft Operations Manager - Windows Policies Changed COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updated COBIT: Microsoft Sharepoint Permission Changed COBIT: Microsoft Sharepoint Policies Added, Removed, Modified Alert when user or group permissions have been changed. Alert when users have changed their passwords. Alert when Windows policies changed. Alerts on Microsoft Sharepoint content deleted events. Alerts on Microsoft Sharepoint content updated events. Alerts on Microsoft Sharepoint permission changed events. Alerts on Microsoft Sharepoint policy additions, deleteions, and modifications. 83 COBIT: Microsoft SQL Server Backup Failed Alert when Microsoft SQL Server backup process has failed. 84 COBIT: Microsoft SQL Server Restore Failed Alert when Microsoft SQL Server restore process failed. 85 COBIT: Microsoft SQL Server Shutdown Alert when Microsoft SQL Server has been shutdown. 86 COBIT: Neoteris Files Accessed Identifies all files being accessed through the Juniper SSL VPN. 87 COBIT: NetApp Authentication Failure Alert when logins failed on NetApp Filer devices. 88 COBIT: NetApp Bad File Handle Alert when disk access errors occurred on NetApp Filer devices. 89 COBIT: NetApp Bootblock Update Alert when the bootblock has been updated on a NetApp filer 90 COBIT: NetApp Filer Audit Policies Alert when NetApp Filer Audit policies changed. Changed 91 COBIT: NetApp Filer Disk Failure Alert when disks are failing on the NetApp Filer device. 92 COBIT: NetApp Filer Disk Missing Alert when a disk is missing on the NetApp Filer device. 93 COBIT: NetApp Filer Disk Scrub Alert when the disk scrubbing process has been suspended. Suspended 94 COBIT: NetApp Filer File System Full Alert when the file system is full on the NetApp Filer device. 95 COBIT: NetApp Filer NIS Group Update Alert when the NIS group has been updated on the Filer device. 96 COBIT: NetApp Filer Disk Inserted Alert when a disk is inserted into the NetApp Filer 97 COBIT: NetApp Filer Disk Pulled Alert when a RAID disk has been pulled from the Filer device. 98 COBIT: NetApp Filer Snapshot Error Alert when the Filer device is experiencing backup problems. SOX and COBIT Compliance Suite Quick Start Guide 27
28 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley # LogLogic Alert Description 99 COBIT: NetApp Filer Unauthorized Mounting Alert when an unauthorised mount event occurs. 100 COBIT: Oracle Database Configuration Alerts when a ALTER or UPDATE command is executed on Oracle DB's. Change 101 COBIT: Oracle Database Data Access Alerts when Oracle tables are accessed. 102 COBIT: Oracle Database Permissions Alert when permissions are changed on Oracle databases. Changed 103 COBIT: Oracle Database Shutdown Alerts when an Oracle database is shutdown. 104 COBIT: Oracle Database User Added or Alerts when a user is added or deleted from an Oracle database. Deleted 105 COBIT: Policy Violation Firewall policy violations. 106 COBIT: RACF Files Accessed Alert when files are accessed on the RACF servers. 107 COBIT: RACF Passwords Changed Alert when users have changed their passwords. 108 COBIT: RACF Permissions Changed Alert when user or group permissions have been changed. 109 COBIT: RACF Process Started Alert whenever a process is run on a RACF server. 110 COBIT: Sybase ASE Database Backed Up or Restored Alerts on backup and restore events to the Sybase ASE Database. 111 COBIT: Sybase ASE Database Config Alerts on Sybase ASE Database configuration change events. Changes 112 COBIT: Sybase ASE Database Data Access Alerts on Sybase ASE Database data access events. 113 COBIT: Sybase ASE Database Started Alerts on Sybase ASE Database start events. 114 COBIT: Sybase ASE Database Stopped Alerts on Sybase ASE Database stop events COBIT: Symantec Endpoint Protection Configuration Changed COBIT: Symantec Endpoint Protection Policy Add, Delete, Modify Alert when configuration changes are made to the Symantec Endpoint Protection. Alerts on Symantec Endpoint Protection additions, deleteions, and modifications. 117 COBIT: System Anomalies Detects and alerts any anomalies based on past log patterns. 118 COBIT: System Restarted Detects and alerts when system is restarted. 119 COBIT: UNIX Groups Added Alert when a new group has been added to the UNIX/Linux servers. 120 COBIT: UNIX Groups Deleted Alert when a group has been removed to the UNIX servers. 121 COBIT: UNIX Groups Modified Alert when a group has been modified on the UNIX/Linux servers. 122 COBIT: UNIX Privilege Escalated Alert when a user has escalated privileges using commands such as su/ sudo. 123 COBIT: vcenter Create Virtual Machine Virtual machine has been created from VMware vcenter console. 124 COBIT: vcenter Data Move Entity has been moved within the VMware vcenter infrastructure. 125 COBIT: vcenter Datastore Event Displays create, modify, and delete datastore events on VMware vcenter. 126 COBIT: vcenter Delete Virtual Machine Virtual machine has been deleted or removed from WMWare vcenter console. 127 COBIT: vcenter Firewall Policy Change Displays changes to the VMware ESX allowed services firewall policy COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Data Move COBIT: vcenter Orchestrator Datastore Events Virtual machine has been created from VMware vcenter Orchestrator console. Entity has been moved within the VMware vcenter Orchestrator infrastructure. Displays create, modify, and delete datastore events on VMware vcenter Orchesrator. 28 SOX and COBIT Compliance Suite Quick Start Guide
29 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley # LogLogic Alert Description 131 COBIT: vcenter Orchestrator Delete Virtual Machine Virtual machine has been deleted or removed from WMWare vcenter Orchestrator console. 132 COBIT: vcenter Orchestrator Login Failed Failed logins to the VMware vcenter Orchestrator console COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Orchestrator vswitch Add, Modify or Delete Virtual machine has been shutdown or paused from VMware vcenter Orchestrator console. Virtual machine has been started or resumed from VMware vcenter Orchestrator console. vswitch on VMware ESX server has been added, modified or removed from vcenter Orchestrator. 136 COBIT: vcenter Permission Change A permission role has been added, changed, removed, or applied on VMware vcenter. 137 COBIT: vcenter Restart ESX Services VMware vcenter restarted services running on VMware ESX Server. 138 COBIT: vcenter Shutdown or Restart ESX VMware ESX Server is shutdown from vcenter console. 139 COBIT: vcenter User Login Failed Failed logins to the VMware vcenter console. 140 COBIT: vcenter User Login Successful Successful logins to the VMware vcenter console COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started Virtual machine has been shutdown or paused from VMware vcenter console. Virtual machine has been started or resumed from VMware vcenter console. 143 COBIT: vcenter vswitch Modify or Delete vswitch on VMware ESX server has been modified or removed from vcenter. 144 COBIT: vcloud Director Login Failed Failed logins to the VMware vcloud Director console. 145 COBIT: vcloud Director Login Success Successful logins to the VMware vcloud Director console. 146 COBIT: vcloud Organization Created Organization successfully created on VMware vcloud Director. 147 COBIT: vcloud Organization Deleted Organization successfully deleted on VMware vcloud Director. 148 COBIT: vcloud Organization Modified Organization successfully modified on VMware vcloud Director. 149 COBIT: vcloud User Created User successfully created on VMware vcloud Director COBIT: vcloud User, Group, or Role Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted VMware vcloud Director user, group, or role has been modified. VMware vcloud Director vapp has been created, deleted, or modified. VMware vcloud Director Virtual Datacenters have been created, deleted, or modified. 153 COBIT: vshield Edge Configuration Alerts on configuration changes to VMware vshield Edge policies. Changes 154 COBIT: Windows Audit Log Cleared Alert when audit logs on Windows servers have been cleared. 155 COBIT: Windows Files Accessed Show files accessed on the Windows servers. 156 COBIT: Windows Group Members Added Alert when new members are added to user groups on Windows servers. 157 COBIT: Windows Group Members Deleted Alert when members are removed from user groups on Windows servers. 158 COBIT: Windows Groups Created Alert when new user groups are created on Windows servers. 159 COBIT: Windows Groups Deleted Alert when a user group is deleted on Windows servers. 160 COBIT: Windows Groups Modified Alert when a user group has been modified on Windows servers. 161 COBIT: Windows Passwords Changed Alert when users have changed their passwords. 162 COBIT: Windows Permissions Changed Alert when user or group permissions have been changed. 163 COBIT: Windows Policies Changed Alert when Windows policies changed. 164 COBIT: Windows Privileges Escalated Alert when a user or program has escalated the privileges. SOX and COBIT Compliance Suite Quick Start Guide 29
30 LogLogic Custom Reports and Alerts for COBIT 4.1 and Sarbanes-Oxley : LogLogic Alerts for COBIT 4.1 and Sarbanes-Oxley # LogLogic Alert Description 165 COBIT: Windows Programs Accessed Alert whenever a program is accessed on a Windows server. 166 COBIT: Windows Server Restarted Alert when a Windows server has been restarted. 167 COBIT: Windows Software Updates Alert when events related to the Windows' software updates. 168 COBIT: Windows Software Updates Failed Alert when failed events related to the software updates. 169 COBIT: Windows Software Updates Succeeded Alert for successful events related to the software updates. 30 SOX and COBIT Compliance Suite Quick Start Guide
31 LogLogic Reports and Alerts Quick Reference The following table describes the reports and alerts included in the LogLogic Compliance Suite for COBIT 4.1 Control Objective Description Compliance Suite Reports and Alerts PO2 Define the Information Architecture PO2.3 Data Classification Scheme Compliance Suite Reports COBIT: Guardium SQL Guard Data Audit Access COBIT: Guardium SQL Guard Data Access COBIT: LogLogic DSM Data Access COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updates COBIT: Microsoft SQL Server Data Access COBIT: Microsoft SQL Server Schema Corruption COBIT: Oracle Database Data Access COBIT: Sybase ASE Database Data Access COBIT: i5/os Object Access Compliance Suite Alerts COBIT: Guardium SQL Guard Data Access COBIT: LogLogic DSM Data Access COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updated COBIT: Oracle Database Data Access COBIT: Sybase ASE Database Data Access PO2.4 Integrity Management Compliance Suite Report COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updates COBIT: Microsoft SQL Server Schema Corruption COBIT: Tripwire Modifications, Additions, and Deletions Compliance Suite Alerts COBIT: Guardium SQL Guard Data Access COBIT: Microsoft Sharepoint Content Deleted COBIT: Microsoft Sharepoint Content Updated SOX and COBIT Compliance Suite Quick Start Guide 31
32 PO4 Define the IT Processes, Organization and Relationships PO4.11 Segregation of Duties Compliance Suite Reports COBIT: Accepted VPN Connections - RADIUS COBIT: Account Activities on UNIX Servers COBIT: Account Activities on Windows Servers COBIT: Account Created on NetApp Filer Audit COBIT: Accounts Created on NetApp Filer COBIT: Accounts Created on Sidewinder COBIT: Accounts Created on Symantec Endpoint Protection COBIT: Accounts Created on TIBCO Administrator COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Active Directory System Changes COBIT: Administrator Logins on Windows Servers COBIT: Check Point Management Station Login COBIT: ESX Accounts Activities COBIT: ESX Group Activities COBIT: ESX Logins Succeeded COBIT: F5 BIG-IP TMOS Login Successful COBIT: Group Activities on NetApp Filer Audit COBIT: Group Activities on Symantec Endpoint Protection COBIT: Group Activities on UNIX Servers COBIT: Group Activities on Windows Servers COBIT: Groups Created on UNIX Servers COBIT: Groups Created on Windows Servers COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: i5/os Access Control List Modifications COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Last Activity Performed by Administrators COBIT: Last Activity Performed by All Users COBIT: Logins by Authentication Type COBIT: Microsoft Operations Manager - Windows Account Activities COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft Sharepoint Permissions Changed COBIT: Microsoft Sharepoint Policy Add, Remove, or Modify COBIT: Microsoft SQL Server Database Permission Events COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer Login Successful COBIT: Oracle Database Permission Events COBIT: Permissions Modified on Windows Servers COBIT: RACF Permissions Changed COBIT: RACF Successful Logins 32 SOX and COBIT Compliance Suite Quick Start Guide
33 PO4 Define the IT Processes, Organization and Relationships PO4.11 Segregation of Duties Compliance Suite Reports - Continued COBIT: Root Logins COBIT: Successful Logins COBIT: TIBCO Administrator Permission Changes COBIT: Unauthorized Logins COBIT: Unencrypted Logins COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Successful Logins COBIT: vcenter User Permission Change COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud Successful Logins COBIT: vcloud User Created COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete Compliance Suite Alerts COBIT: Accounts Created COBIT: Cisco PIX Logon Success COBIT: DB2 Database User Added or Dropped COBIT: Groups Created COBIT: Groups Deleted COBIT: Group Members Added COBIT: i5/os Permission or Policy Change COBIT: Juniper Firewall Logon Success COBIT: Logins Succeeded COBIT: Microsoft Operations Manager - Permissions Changed COBIT: Microsoft Sharepoint Permission Changed COBIT: Microsoft Sharepoint Policies Added, Removed, Modified COBIT: Oracle Database Permissions Changed COBIT: RACF Permissions Changed COBIT: Symantec Endpoint Protection Policy Add, Delete, Modify COBIT: UNIX Groups Added COBIT: UNIX Groups Deleted COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcenter Permission Change COBIT: vcenter User Login Successful SOX and COBIT Compliance Suite Quick Start Guide 33
34 PO4 Define the IT Processes, Organization and Relationships PO4.11 Segregation of Duties Compliance Suite Alerts - Continued COBIT: vcloud Director Login Success COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud User Created COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: Windows Group Members Added COBIT: Windows Groups Created COBIT: Windows Groups Deleted COBIT: Windows Permissions Changed 34 SOX and COBIT Compliance Suite Quick Start Guide
35 PO7 Manage IT Human Resources PO7.8 Job Change and Termination Compliance Suite Reports COBIT: Accepted VPN Connections - RADIUS COBIT: Account Activities on UNIX Servers COBIT: Account Activities on Windows Servers COBIT: Accounts Changed on NetApp Filer COBIT: Accounts Changed on Sidewinder COBIT: Accounts Changed on TIBCO Administrator COBIT: Accounts Created on NetApp Filer COBIT: Accounts Created on Sidewinder COBIT: Accounts Created on Symantec Endpoint Protection COBIT: Accounts Created on TIBCO Administrator COBIT: Accounts Changed on UNIX Servers COBIT: Accounts Changed on Windows Servers COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Accounts Deleted on NetApp Filer COBIT: Accounts Deleted on NetApp Filer Audit COBIT: Accounts Deleted on Sidewinder COBIT: Accounts Deleted on Symantec Endpoint Protection COBIT: Accounts Deleted on TIBCO Administrator COBIT: Accounts Deleted on UNIX Servers COBIT: Accounts Deleted on Windows Servers COBIT: Accounts Removed from Groups on Windows Servers COBIT: Active VPN Connections for Cisco VPN Concentrators COBIT: Active VPN Connections for Nortel Contivity COBIT: Active VPN Connections for RADIUS COBIT: Check Point Management Station Login COBIT: Cisco ISE, ACS Accounts Removed COBIT: DB2 Database Failed Logins COBIT: DB2 Database Logins COBIT: ESX Accounts Activities COBIT: ESX Accounts Deleted COBIT: ESX Group Activities COBIT: ESX Logins Succeeded COBIT: Group Activities on NetApp Filer Audit COBIT: Group Activities on Symantec Endpoint Protection SOX and COBIT Compliance Suite Quick Start Guide 35
36 PO7.8 Job Change and Termination Compliance Suite Reports - Continued COBIT: Group Activities on UNIX Servers COBIT: Group Activities on Windows Servers COBIT: Guardium SQL Guard Audit Logins COBIT: Guardium SQL Guard Logins COBIT: Group Members Deleted COBIT: F5 BIG-IP TMOS Login Successful COBIT: i5/os Access Control List Modifications COBIT: i5/os Network Authentication Events COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Last Activity Performed by Administrators COBIT: Last Activity Performed by All Users COBIT: Logins by Authentication Type COBIT: LogLogic DSM Logins COBIT: Microsoft Operations Manager - Windows Account Activities COBIT: Microsoft Operations Manager - Windows Accounts Changed COBIT: Microsoft Operations Manager - Windows Accounts Enabled COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft SQL Server Database Failed Logins COBIT: Microsoft SQL Server Database Logins COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer Login Successful COBIT: Oracle Database Failed Logins COBIT: Oracle Database Logins COBIT: Permissions Modified on Windows Servers COBIT: RACF Accounts Deleted COBIT: RACF Accounts Modified COBIT: RACF Permissions Changed COBIT: RACF Successful Logins COBIT: Successful Logins COBIT: Symantec Endpoint Protection Password Changes COBIT: TIBCO Administrator Permission Changes COBIT: Unencrypted Logins COBIT: Users Removed from Servers COBIT: vcenter Successful Logins COBIT: vcloud Successful Logins COBIT: vcloud User Created COBIT: vcloud User Deleted or Removed 36 SOX and COBIT Compliance Suite Quick Start Guide
37 PO7.8 Job Change and Termination Compliance Suite Alerts COBIT: Accounts Created COBIT: Accounts Deleted COBIT: Accounts Modified COBIT: Cisco PIX Logon Success COBIT: DB2 Database User Added or Dropped COBIT: Guardium SQL Guard Logins COBIT: Groups Deleted COBIT: Group Members Added COBIT: Group Members Deleted COBIT: i5/os Network Profile Changes COBIT: i5/os User Profile Changes COBIT: Juniper Firewall Logon Success COBIT: Logins Succeeded COBIT: LogLogic DSM Logins COBIT: NetApp Filer NIS Group Update COBIT: UNIX Groups Deleted COBIT: UNIX Groups Modified COBIT: vcenter User Login Successful COBIT: vcloud Director Login Success COBIT: vcloud User Created COBIT: vcloud User, Group, or Role Modified COBIT: Windows Group Members Added COBIT: Windows Group Members Deleted COBIT: Windows Groups Deleted COBIT: Windows Groups Modified SOX and COBIT Compliance Suite Quick Start Guide 37
38 AI2 Acquire and Maintain Application Software AI2.3 Application Control and Auditability Compliance Suite Reports COBIT: ESX Kernel log daemon terminating COBIT: ESX Kernel logging Stop COBIT: ESX Syslogd Restart COBIT: LogLogic File Retrieval Errors COBIT: LogLogic Message Routing Errors COBIT: New Services Installed on Windows Servers COBIT: RACF Process Started COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Restart ESX Services COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete Compliance Suite Alerts COBIT: LogLogic Message Routing Errors COBIT: LogLogic File Retrieval Errors COBIT: RACF Process Started COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Restart ESX Services COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: Windows Programs Accessed 38 SOX and COBIT Compliance Suite Quick Start Guide
39 AI2.4 Application Security and Availability Compliance Suite Reports COBIT: Active Directory System Changes COBIT: i5/os Access Control List Modifications COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft Sharepoint Permissions Changed COBIT: Microsoft Sharepoint Policy Add, Remove, or Modify COBIT: Microsoft SQL Server Database Permission Events COBIT: Oracle Database Permission Events COBIT: Permissions Modified on Windows Servers COBIT: RACF Permissions Changed COBIT: TIBCO Administrator Permission Changes COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter User Permission Change COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete Compliance Suite Alerts COBIT: i5/os Permission or Policy Change COBIT: Microsoft Sharepoint Permission Changed COBIT: Microsoft Sharepoint Policies Added, Removed, Modified COBIT: Oracle Database Permissions Changed COBIT: RACF Permissions Changed COBIT: Symantec Endpoint Protection Policy Add, Remove, Modify COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcenter Permission Change COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified SOX and COBIT Compliance Suite Quick Start Guide 39
40 AI2.4 Application Security and Availability COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: Windows Permissions Changed 40 SOX and COBIT Compliance Suite Quick Start Guide
41 AI3 Acquire and Maintain Technology Infrastructure AI3.2 Infrastructure Resource Protection and Availability Compliance Suite Reports COBIT: Active Directory System Changes COBIT: Check Point Objects Created COBIT: Check Point Objects Deleted COBIT: Creation and Deletion of System Level Objects: AIX Audit COBIT: Creation and Deletion of System Level Objects: DB2 Database COBIT: Creation and Deletion of System Level Objects: HP-UX Audit COBIT: Creation and Deletion of System Level Objects: Windows COBIT: Creation and Deletion of System Level Objects: Oracle COBIT: Creation and Deletion of System Level Objects: SQL Server COBIT: Creation and Deletion of System Level Objects: Solaris BSM COBIT: Domain activities on Symantec Endpoint Protection COBIT: i5/os Object Creation and Deletion COBIT: Microsoft SQL Server Schema Corruption COBIT: Sybase ASE Database Create Events COBIT: Sybase ASE Database Drop Events COBIT: Tripwire Modifications, Additions, and Deletions COBIT: Trusted Domain Created on Windows Servers COBIT: Trusted Domain Deleted on Windows Servers COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete SOX and COBIT Compliance Suite Quick Start Guide 41
42 AI3.2 Infrastructure Resource Protection and Availability Compliance Suite Alerts COBIT: Cisco PIX NAT Failure COBIT: Cisco PIX Protocol Failure COBIT: Cisco PIX Routing Failure COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted 42 SOX and COBIT Compliance Suite Quick Start Guide
43 AI3.3 Infrastructure Maintenance Compliance Suite Reports COBIT: Active Directory System Changes COBIT: Check Point Configuration Changes COBIT: Cisco ISE, ACS Configuration Changes COBIT: Cisco Peer Reset/Reload COBIT: Cisco Peer Supervisor Status Changes COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco Routers and Switches Restart COBIT: DB2 Database Configuration Changes COBIT: DB2 Database Stop and Start Events COBIT: Cisco ESA: Updated COBIT: F5 BIG-IP TMOS Restarted COBIT: Guardium SQL Guard Audit Configuration Changes COBIT: Guardium SQL Guard Audit Startup or Shutdown COBIT: Guardium SQL Guard Configuration Changes COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os System Management Changes COBIT: Juniper Firewall Reset Accepted COBIT: Juniper Firewall Reset Imminent COBIT: Juniper Firewall Restarted COBIT: LogLogic DSM Configuration Changes COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft SQL Server Configuration Changes COBIT: Microsoft SQL Server Shutdown by Reason COBIT: New Services Installed on Windows Servers COBIT: Oracle Database Configuration Changes COBIT: Oracle Database Shutdown COBIT: Peer Servers and Status COBIT: Peer Servers and Status - Microsoft IIS COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: RACF Process Started COBIT: Sybase ASE Database Configuration Changes COBIT: Sybase ASE Database Startup or Shutdown COBIT: Symantec AntiVirus: Updated COBIT: Symantec Endpoint Protection Configuration Changes COBIT: Symantec Endpoint Protection: Updated COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart of ESX Server COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: vcloud Organization Created SOX and COBIT Compliance Suite Quick Start Guide 43
44 AI3.3 Infrastructure Maintenance Compliance Suite Reports - Continued COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete COBIT: Windows Servers Restarted COBIT: Windows Update Events COBIT: Windows Update Failures COBIT: Windows Update Successful Events Compliance Suite Alerts COBIT: Check Point Policy Changed COBIT: Cisco ISE, ACS Configuration Changed COBIT: Cisco PIX Device Restart COBIT: Cisco PIX Failover Errors COBIT: Cisco PIX Failover Performed COBIT: Cisco PIX Failover Disabled COBIT: Cisco Switch Card Insert COBIT: Cisco Switch Device Reload COBIT: Cisco Switch Device Restart COBIT: Cisco Switch HA Failure (ver) COBIT: DB2 Database Configuration Change COBIT: DB2 Database Started or Stopped COBIT: DNS Server Shutdown COBIT: DNS Server Started COBIT: Guardium SQL Guard Config Changes COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Server or Service Status Change COBIT: i5/os Software Updates COBIT: Juniper Firewall HA State Change COBIT: Juniper Firewall Peer Missing COBIT: Juniper Firewall System Reset COBIT: LogLogic Disk Full COBIT: LogLogic DSM Configuration Changes COBIT: LogLogic DSM Startup or Shutdown COBIT: NetApp Bad File Handle COBIT: NetApp Filer Disk Failure COBIT: NetApp Filer Disk Missing COBIT: NetApp Filer File System Full COBIT: NetApp Filer Disk Inserted COBIT: NetApp Filer Disk Pulled COBIT: Oracle Database Configuration Change COBIT: Oracle Database Shutdown COBIT: Sybase ASE Database Config Changes COBIT: Sybase ASE Database Started COBIT: Sybase ASE Database Stopped COBIT: Symantec Endpoint Protection Configuration Changed COBIT: System Anomalies COBIT: System Restarted COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Orchestrator Create Virtual Machine 44 SOX and COBIT Compliance Suite Quick Start Guide
45 AI3.3 Infrastructure Maintenance Compliance Suite Alerts - Continued COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart ESX COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: Windows Server Restarted COBIT: Windows Software Events COBIT: Windows Software Updates Failed COBIT: Windows Software Updates Succeeded SOX and COBIT Compliance Suite Quick Start Guide 45
46 AI6 Manage Changes AI6 Change Standards and Procedures Compliance Suite Reports COBIT: Active Directory System Changes COBIT: Check Point Configuration Changes COBIT: Check Point Objects Modified COBIT: Cisco ISE, ACS Configuration Changes COBIT: Cisco ESA: Updated COBIT: Cisco Peer Reset/Reload COBIT: Cisco Peer Supervisor Status Changes COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco Routers and Switches Restart COBIT: DB2 Database Configuration Changes COBIT: DB2 Database Stop and Start Events COBIT: Guardium SQL Guard Audit Configuration Changes COBIT: Guardium SQL Guard Audit Startup or Shutdown COBIT: Guardium SQL Guard Configuration Changes COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Audit Configuration Changes COBIT: i5/os System Management Changes COBIT: Juniper Firewall Reset Accepted COBIT: Juniper Firewall Reset Imminent COBIT: Juniper Firewall Restarted COBIT: LogLogic DSM Configuration Changes COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft SQL Server Configuration Changes COBIT: Microsoft SQL Server Shutdown by Reason COBIT: New Services Installed on Windows Servers COBIT: Oracle Database Configuration Changes COBIT: Oracle Database Shutdown COBIT: Peer Servers and Status COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Sybase ASE Database Configuration Changes COBIT: Sybase ASE Database Startup or Shutdown COBIT: Symantec AntiVirus: Updated COBIT: Symantec Endpoint Protection: Updated COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart of ESX Server COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete 46 SOX and COBIT Compliance Suite Quick Start Guide
47 AI6 Change Standards and Procedures Compliance Suite Alerts COBIT: Check Point Policy Changed COBIT: Cisco ISE, ACS Configuration Changed COBIT: Cisco PIX Device Restart COBIT: Cisco PIX Failover Disabled COBIT: Cisco PIX Failover Errors COBIT: Cisco PIX Failover Performed COBIT: Cisco Switch Device Reload COBIT: Cisco Switch Device Restart COBIT: Cisco Switch HA Failure (ver) COBIT: DB2 Database Configuration Change COBIT: DB2 Database Started or Stopped COBIT: DNS Server Shutdown COBIT: DNS Server Started COBIT: Guardium SQL Guard Config Changes COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Server or Service Status Change COBIT: i5/os Software Updates COBIT: Juniper Firewall HA State Change COBIT: Juniper Firewall Peer Missing COBIT: Juniper Firewall System Reset COBIT: LogLogic DSM Configuration Changes COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft SQL Server Shutdown COBIT: NetApp Filer File System Full COBIT: Oracle Database Configuration Change COBIT: Oracle Database Shutdown COBIT: RACF Process Started COBIT: Sybase ASE Database Config Changes COBIT: Sybase ASE Database Started COBIT: Sybase ASE Database Stopped COBIT: Symantec Endpoint Protection Configuration Changed COBIT: System Anomalies COBIT: System Restarted COBIT: Trusted Domain Deleted on Windows Servers COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart ESX COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: vcloud Organization Created SOX and COBIT Compliance Suite Quick Start Guide 47
48 AI6 Change Standards and Procedures Compliance Suite Alerts - Continued COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: Windows Server Restarted COBIT: Windows Software Updates COBIT: Windows Software Updates Failed COBIT: Windows Software Updates Succeeded AI6.1 Change Standards and Procedures COBIT: Domain activities on Symantec Endpoint Protection DS1 Define and Manage Service Levels COBIT: F5 BIG-IP TMOS Restarted COBIT: Peer Servers and Status - Microsoft IIS COBIT: Symantec Endpoint Protection Configuration Changes DS1.5 Monitoring and Reporting of Service Level Achievements Compliance Suite Reports COBIT: Cisco Line Protocol Status Changes COBIT: Cisco Link Changes COBIT: Cisco Peer Reset/Reload COBIT: Cisco Peer Supervisor Status Changes COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco Routers and Switches Restart COBIT: DB2 Database Stop and Start Events COBIT: DHCP Granted/Renewed Activities on Microsoft DHCP COBIT: DHCP Granted/Renewed Activities on VMware vshield COBIT: DNS Server Error COBIT: F5 BIG-IP TMOS Restarted COBIT: Failed Windows Events Summary COBIT: Guardium SQL Guard Audit Startup or Shutdown COBIT: Guardium SQL Guard Startup or Shutdown COBIT: Juniper Firewall Reset Accepted COBIT: Juniper Firewall Reset Imminent COBIT: Juniper Firewall Restarted COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft Operations Manager - Failed Windows Events 48 SOX and COBIT Compliance Suite Quick Start Guide
49 DS1.5 Monitoring and Reporting of Service Level Achievements Compliance Suite Reports - Continued COBIT: Microsoft Operations Manager - Windows Events Summary COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft SQL Server Shutdown by Reason COBIT: Oracle Database Shutdown COBIT: Peer Servers and Status COBIT: Peer Servers and Status - Microsoft IIS COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Sybase ASE Database Startup or Shutdown COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart of ESX Server COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: Windows Events Summary COBIT: Windows Servers Restarted Compliance Suite Alerts COBIT: Cisco PIX Device Restart COBIT: Cisco PIX Failover Errors COBIT: Cisco PIX Failover Performed COBIT: Cisco PIX Failover Disabled COBIT: Cisco PIX NAT Failure COBIT: Cisco PIX Protocol Failure COBIT: Cisco PIX Routing Failure COBIT: Cisco Switch Device Reload COBIT: Cisco Switch Device Restart COBIT: Cisco Switch HA Failure (ver) COBIT: Cisco Switch Interface Change COBIT: Cisco Switch Interface Down COBIT: Cisco Switch Interface Up COBIT: DB2 Database Started or Stopped COBIT: DNS Server Shutdown COBIT: DNS Server Started COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Server or Service Status Change COBIT: Juniper Firewall HA State Change COBIT: Juniper Firewall Peer Missing SOX and COBIT Compliance Suite Quick Start Guide 49
50 DS1.5 Monitoring and Reporting of Service Level Achievements Compliance Suite Alerts - Continued COBIT: Juniper Firewall System Reset COBIT: LogLogic Disk Full COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft SQL Server Shutdown COBIT: NetApp Bad File Handle COBIT: NetApp Filer Disk Failure COBIT: NetApp Filer Disk Missing COBIT: NetApp Filer File System Full COBIT: Oracle Database Shutdown COBIT: Sybase ASE Database Started COBIT: Sybase ASE Database Stopped COBIT: System Anomalies COBIT: System Restarted COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart ESX COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: Windows Server Restarted 50 SOX and COBIT Compliance Suite Quick Start Guide
51 DS2 Manage Third-Party Services DS2.4 Supplier Performance Monitoring Compliance Suite Reports COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco Routers and Switches Restart COBIT: DB2 Database Stop and Start Events COBIT: DNS Server Error COBIT: F5 BIG-IP TMOS Restarted COBIT: Guardium SQL Guard Audit Startup or Shutdown COBIT: Guardium SQL Guard Startup or Shutdown COBIT: Juniper Firewall Reset Accepted COBIT: Juniper Firewall Reset Imminent COBIT: Juniper Firewall Restarted COBIT: Juniper Firewall VPN Tunnel Status Change COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft SQL Server Shutdown by Reason COBIT: Oracle Database Shutdown COBIT: Peer Servers and Status COBIT: Peer Servers and Status - Microsoft IIS COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Sybase ASE Database Startup or Shutdown COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart of ESX Server COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: Windows Servers Restarted SOX and COBIT Compliance Suite Quick Start Guide 51
52 DS2.4 Supplier Performance Monitoring Compliance Suite Alerts COBIT: Cisco PIX Device Restart COBIT: Cisco PIX Failover Errors COBIT: Cisco PIX Failover Performed COBIT: Cisco PIX Failover Disabled COBIT: Cisco PIX VPN Tunnel Creation COBIT: Cisco PIX VPN Tunnel Teardown COBIT: Cisco Switch Device Reload COBIT: Cisco Switch Device Restart COBIT: Cisco Switch HA Failure (ver) COBIT: DB2 Database Started or Stopped COBIT: DNS Server Shutdown COBIT: DNS Server Started COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Server or Service Status Change COBIT: Juniper Firewall HA State Change COBIT: Juniper Firewall System Reset COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft SQL Server Shutdown COBIT: NetApp Filer File System Full COBIT: Oracle Database Shutdown COBIT: Sybase ASE Database Started COBIT: Sybase ASE Database Stopped COBIT: System Anomalies COBIT: System Restarted COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart ESX COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started 52 SOX and COBIT Compliance Suite Quick Start Guide
53 DS3 Manage Performance and Capacity DS3.5 Monitoring and Reporting of Performance and Capacity Compliance Suite Reports COBIT: Bandwidth Usage by User COBIT: Cisco Line Protocol Status Changes COBIT: Cisco Link Changes COBIT: Cisco Peer Reset/Reload COBIT: Cisco Peer Supervisor Status Changes COBIT: Cisco PIX, ASA, FWSM Failover Disabled COBIT: Cisco PIX, ASA, FWSM Failover Performed COBIT: Cisco Routers and Switches Restart COBIT: DB2 Database Stop and Start Events COBIT: DNS Server Error COBIT: F5 BIG-IP TMOS Restarted COBIT: Failed Windows Events Summary COBIT: Guardium SQL Guard Audit Startup or Shutdown COBIT: Guardium SQL Guard Startup or Shutdown COBIT: Juniper Firewall Reset Accepted COBIT: Juniper Firewall Reset Imminent COBIT: Juniper Firewall Restarted COBIT: LogLogic DSM Startup or Shutdown COBIT: Microsoft Operations Manager - Failed Windows Events COBIT: Microsoft Operations Manager - Windows Events Summary COBIT: Microsoft Operations Manager - Windows Servers Restarted COBIT: Microsoft SQL Server Shutdown by Reason COBIT: Oracle Database Shutdown COBIT: Peer Servers and Status COBIT: Peer Servers and Status - Microsoft IIS COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Sybase ASE Database Startup or Shutdown COBIT: vcenter Orchestrator Virtual Machine Shutdown COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart of ESX Server COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: VPN Connection Average Bandwidth SOX and COBIT Compliance Suite Quick Start Guide 53
54 DS3.5 Monitoring and Reporting of Performance and Capacity Compliance Suite Reports - Continued COBIT: VPN Connection Average Duration COBIT: VPN Connection Disconnect Reasons COBIT: Windows Events Summary COBIT: Windows Servers Restarted Compliance Suite Alerts COBIT: Cisco PIX Device Restart COBIT: Cisco PIX Failover Errors COBIT: Cisco PIX Failover Performed COBIT: Cisco PIX Failover Disabled COBIT: Cisco PIX NAT Failure COBIT: Cisco PIX Protocol Failure COBIT: Cisco PIX Routing Failure COBIT: Cisco Switch Device Reload COBIT: Cisco Switch HA Failure (ver) COBIT: Cisco Switch Device Restart COBIT: Cisco Switch Interface Change COBIT: Cisco Switch Interface Down COBIT: Cisco Switch Interface Up COBIT: DB2 Database Started or Stopped COBIT: DNS Server Shutdown COBIT: DNS Server Started COBIT: Guardium SQL Guard Startup or Shutdown COBIT: i5/os Server or Service Status Change COBIT: Juniper Firewall HA State Change COBIT: Juniper Firewall Peer Missing COBIT: Juniper Firewall System Reset COBIT: LogLogic Disk Full COBIT: LogLogic DSM Startup or Shutdown COBIT: NetApp Bad File Handle COBIT: NetApp Filer Disk Failure COBIT: NetApp Filer Disk Missing COBIT: NetApp Filer File System Full COBIT: Oracle Database Shutdown COBIT: Sybase ASE Database Started COBIT: Sybase ASE Database Stopped COBIT: System Anomalies COBIT: System Restarted COBIT: vcenter Orchestrator Virtual Machine Shutdown 54 SOX and COBIT Compliance Suite Quick Start Guide
55 DS4 Ensure Continuous Service DS3.5 Monitoring and Reporting of Performance and Capacity Compliance Suite Alerts - Continued COBIT: vcenter Orchestrator Virtual Machine Started COBIT: vcenter Shutdown or Restart ESX COBIT: vcenter Virtual Machine Shutdown COBIT: vcenter Virtual Machine Started COBIT: Windows Server Restarted SOX and COBIT Compliance Suite Quick Start Guide 55
56 DS4.1 IT Continuity Framework Compliance Suite Reports COBIT: Files Accessed on NetApp Filer Audit COBIT: Files Accessed on Servers COBIT: Files Accessed through Juniper SSL VPN (Secure Access) COBIT: Files Downloaded via Proxy COBIT: Files Downloaded via Proxy - Microsoft IIS COBIT: Files Downloaded via the Web COBIT: Files Downloaded via the Web - F5 BIG-IP TMOS COBIT: Files Downloaded via the Web - Microsoft IIS COBIT: Files Uploaded via Proxy COBIT: Files Uploaded via Proxy - Microsoft IIS COBIT: Files Uploaded via the Web COBIT: Files Uploaded via the Web - F5 BIG-IP TMOS COBIT: Files Uploaded via the Web - Microsoft IIS COBIT: NetApp Filer Backup Errors COBIT: NetApp Filer File activity COBIT: RACF Files Accessed COBIT: vcenter Datastore Events COBIT: vcenter Data Move COBIT: vcenter Orchestrator Datastore Events COBIT: vcenter Orchestrator Data Move Compliance Suite Alerts COBIT: Cisco PIX NAT Failure COBIT: Cisco PIX Protocol Failure COBIT: Cisco PIX Routing Failure COBIT: Neoteris Files Accessed COBIT: NetApp Filer Snapshot Error COBIT: NetApp Filer Unauthorized Mounting COBIT: RACF Files Accessed COBIT: vcenter Datastore Event COBIT: vcenter Data Move COBIT: vcenter Orchestrator Data Move COBIT: vcenter Orchestrator Datastore Events COBIT: Windows Files Accessed 56 SOX and COBIT Compliance Suite Quick Start Guide
57 DS4.5 Testing of the IT Continuity Plan Compliance Suite Report DS5 Ensure System Security COBIT: DB2 Database Backup Failed COBIT: Microsoft SQL Server Backup Failed COBIT: NetApp Filer Backup Errors COBIT: Sybase ASE Database Backup and Restoration Compliance Suite Alert COBIT: DB2 Database Backup Failed COBIT: Microsoft SQL Server Backup Failed DS5.2 IT Security Plan Compliance Suite Reports COBIT: Sybase ASE Database Backed Up or Restored COBIT: Files Accessed on NetApp Filer Audit COBIT: Files Accessed on Servers COBIT: Files Accessed through Juniper SSL VPN (Secure Access) COBIT: Files Downloaded via Proxy COBIT: Files Downloaded via Proxy - Microsoft IIS COBIT: Files Downloaded via the Web COBIT: Files Downloaded via the Web - F5 BIG-IP TMOS COBIT: Files Downloaded via the Web - Microsoft IIS COBIT: Files Uploaded via Proxy COBIT: Files Uploaded via Proxy - Microsoft IIS COBIT: Files Uploaded via the Web COBIT: Files Uploaded via the Web - F5 BIG-IP TMOS COBIT: Files Uploaded via the Web - Microsoft IIS COBIT: NetApp Filer File activity COBIT: RACF Files Accessed COBIT: vcenter Datastore Events COBIT: vcenter Data Move COBIT: vcenter Orchestrator Datastore Events COBIT: vcenter Orchestrator Data Move Compliance Suite Alerts COBIT: Neoteris Files Accessed COBIT: NetApp Filer Unauthorized Mounting COBIT: RACF Files Accessed COBIT: vcenter Datastore Event COBIT: vcenter Data Move COBIT: vcenter Orchestrator Data Move COBIT: vcenter Orchestrator Datastore Events COBIT: Windows Files Accessed SOX and COBIT Compliance Suite Quick Start Guide 57
58 DS5.3 (1/4) Identity Management (1/4) Compliance Suite Reports COBIT: Accepted VPN Connections - RADIUS COBIT: Accounts Added to Groups on Windows Servers COBIT: Accounts Changed on NetApp Filer COBIT: Accounts Changed on Sidewinder COBIT: Accounts Changed on TIBCO Administrator COBIT: Accounts Changed on UNIX Servers COBIT: Accounts Changed on Windows Servers COBIT: Accounts Created on NetApp Filer COBIT: Account Created on NetApp Filer Audit COBIT: Accounts Created on Sidewinder COBIT: Accounts Created on Symantec Endpoint Protection COBIT: Accounts Created on TIBCO Administrator COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Check Point Management Station Login COBIT: Cisco ISE, ACS Accounts Created COBIT: DB2 Database Failed Logins COBIT: DB2 Database Logins COBIT: DB2 Database User Additions and Deletions COBIT: Denied VPN Connections - RADIUS COBIT: ESX Accounts Activities COBIT: ESX Accounts Created COBIT: ESX Failed Logins COBIT: ESX Group Activities COBIT: ESX Logins Failed Unknown User COBIT: ESX Logins Succeeded COBIT: F5 BIG-IP TMOS Login Failed COBIT: F5 BIG-IP TMOS Login Successful COBIT: Failed Logins COBIT: Files Accessed on NetApp Filer Audit COBIT: Files Accessed through Juniper SSL VPN (Secure Access) COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: Guardium SQL Guard Audit Logins COBIT: Guardium SQL Guard Logins COBIT: Group Activities on NetApp Filer Audit COBIT: Group Activities on Symantec Endpoint Protection COBIT: i5/os Network Authentication Events 58 SOX and COBIT Compliance Suite Quick Start Guide
59 DS5.3 Identity Management (1/4) Compliance Suite Reports - Continued COBIT: i5/os User Profile Creation, Modification, or Restoration COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Logins by Authentication Type COBIT: LogLogic DSM Logins COBIT: Microsoft Operations Manager - Windows Account Activities COBIT: Microsoft Operations Manager - Windows Accounts Created COBIT: Microsoft Operations Manager - Windows Events by Users COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft Operations Manager - Windows Policies Modified COBIT: Microsoft Sharepoint Permissions Changed COBIT: Microsoft Sharepoint Policy Add, Remove, or Modify COBIT: Microsoft SQL Server Database Failed Logins COBIT: Microsoft SQL Server Database Logins COBIT: NetApp Filer Audit Login Failed COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer File activity COBIT: NetApp Filer Login Failed COBIT: NetApp Filer Login Successful COBIT: Oracle Database Failed Logins COBIT: Oracle Database Logins COBIT: Oracle Database User Additions and Deletions COBIT: RACF Accounts Created COBIT: RACF Failed Logins COBIT: RACF Files Accessed COBIT: RACF Permissions Changed COBIT: RACF Successful Logins COBIT: Successful Logins COBIT: Sybase ASE Database User Additions and Deletions COBIT: Sybase ASE Successful Logins COBIT: Sybase ASE Failed Logins COBIT: TIBCO Administrator Permission Changes SOX and COBIT Compliance Suite Quick Start Guide 59
60 DS5.3 Identity Management (1/4) Compliance Suite Reports - Continued COBIT: Unauthorized Logins COBIT: Unencrypted Logins COBIT: UNIX Failed Logins COBIT: Users Created on Servers COBIT: vcenter Datastore Events COBIT: vcenter Data Move COBIT: vcenter Failed Logins COBIT: vcenter Orchestrator Datastore Events COBIT: vcenter Orchestrator Data Move COBIT: vcenter Orchestrator Failed Logins COBIT: vcenter Successful Logins COBIT: vcenter User Login Failed COBIT: vcenter User Permission Change COBIT: vcloud Director Login Failed COBIT: vcloud Failed Logins COBIT: vcloud Successful Logins COBIT: vcloud User Created COBIT: vcloud User Deleted or Removed COBIT: VPN Users Accessing Corporate Network COBIT: Windows Accounts Enabled Compliance Suite Alerts COBIT: Accounts Created COBIT: Accounts Enabled COBIT: Accounts Modified COBIT: Cisco PIX Logon Failure COBIT: Cisco PIX Logon Success COBIT: DB2 Database User Added or Dropped COBIT: Guardium SQL Guard Logins COBIT: Groups Created COBIT: Group Members Added COBIT: i5/os Network Profile Changes COBIT: i5/os Permission or Policy Change COBIT: i5/os User Profile Changes COBIT: Juniper Firewall Logon Failure COBIT: Juniper Firewall Logon Success COBIT: Logins Succeeded COBIT: Logins Failed COBIT: LogLogic DSM Logins 60 SOX and COBIT Compliance Suite Quick Start Guide
61 DS5.3 Identity Management (1/4) Compliance Suite Alerts - Continued COBIT: Microsoft Operations Manager - Permissions Changed COBIT: Microsoft Operations Manager - Windows Policies Changed COBIT: Microsoft Sharepoint Permission Changed COBIT: Microsoft Sharepoint Policies Added, Removed, Modified COBIT: NetApp Filer Audit Policies Changed COBIT: NetApp Authentication Failure COBIT: NetApp Filer NIS Group Update COBIT: Oracle Database User Added or Deleted COBIT: RACF Files Accessed COBIT: RACF Permissions Changed COBIT: Symantec Endpoint Protection Policy Add, Remove, Modify COBIT: UNIX Groups Added COBIT: UNIX Groups Deleted COBIT: UNIX Groups Modified COBIT: vcenter Datastore Event COBIT: vcenter Data Move COBIT: vcenter Orchestrator Data Move COBIT: vcenter Orchestrator Datastore Events COBIT: vcenter Orchestrator Login Failed COBIT: vcenter Permission Change COBIT: vcenter User Login Failed COBIT: vcenter User Login Successful COBIT: vcloud Director Login Failed COBIT: vcloud Director Login Success COBIT: vcloud User Created COBIT: Windows Group Members Added COBIT: Windows Groups Created SOX and COBIT Compliance Suite Quick Start Guide 61
62 DS5.3 (2/4) Identity Management (2/4) Compliance Suite Reports COBIT: Account Activities on UNIX Servers COBIT: Account Activities on Windows Servers COBIT: Check Point Management Station Login COBIT: DB2 Database Logins COBIT: Escalated Privilege Activities on Servers COBIT: Escalated Privilege Activities on SOX Servers COBIT: Files Accessed on Servers COBIT: Group Activities on UNIX Servers COBIT: Group Activities on Windows Servers COBIT: i5/os Access Control List Modifications COBIT: i5/os Network Authentication Events COBIT: Juniper Firewall Escalated Privilege COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Logins by Authentication Type COBIT: Microsoft SQL Server Database Logins COBIT: Oracle Database Logins COBIT: Permissions Modified on Windows Servers COBIT: Policies Modified on Windows Servers COBIT: Successful Logins COBIT: Sybase ASE Successful Logins COBIT: Unauthorized Logins COBIT: Unencrypted Logins COBIT: VPN Users Accessing Corporate Network COBIT: Windows Events by Users COBIT: Windows Programs Accessed 62 SOX and COBIT Compliance Suite Quick Start Guide
63 DS5.3 Identity Management (2/4) Compliance Suite Alerts COBIT: Cisco PIX Logon Success COBIT: Cisco PIX Privilege Escalated COBIT: Juniper Firewall Logon Success COBIT: Neoteris Files Accessed COBIT: NetApp Filer Unauthorized Mounting COBIT: Logins Succeeded COBIT: UNIX Groups Added COBIT: UNIX Groups Deleted COBIT: UNIX Groups Modified COBIT: UNIX Privilege Escalated COBIT: Windows Files Accessed COBIT: Windows Permissions Changed COBIT: Windows Policies Changed COBIT: Windows Privileges Escalated DS5.3 (3/4) Identity Management (3/4) Compliance Suite Reports COBIT: Accounts Added to Groups on Windows Servers COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: i5/os Access Control List Modifications COBIT: i5/os User Profile Creation, Modification, or Restoration COBIT: Microsoft SQL Server Database User Additions and Deletions COBIT: Permissions Modified on Windows Servers COBIT: Policies Modified on Windows Servers COBIT: Users Created on Servers COBIT: Windows Accounts Enabled Compliance Suite Alerts COBIT: Accounts Enabled COBIT: Cisco PIX Privilege Escalated COBIT: UNIX Groups Added COBIT: UNIX Groups Deleted COBIT: UNIX Groups Modified COBIT: Windows Groups Created COBIT: Windows Group Members Added COBIT: Windows Policies Changed COBIT: Windows Permissions Changed SOX and COBIT Compliance Suite Quick Start Guide 63
64 DS5.3 (4/4) Identity Management (4/4) Compliance Suite Reports COBIT: Account Activities on UNIX Servers COBIT: Account Activities on Windows Servers COBIT: Accounts Added to Groups on Windows Servers COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Check Point Management Station Login COBIT: DB2 Database Logins COBIT: Escalated Privilege Activities on Servers COBIT: Escalated Privilege Activities on SOX Servers COBIT: Failed Logins COBIT: Files Accessed on Servers COBIT: Group Activities on UNIX Servers COBIT: Group Activities on Windows Servers COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: i5/os Access Control List Modifications COBIT: i5/os Network Authentication Events COBIT: i5/os User Profile Creation, Modification, or Restoration COBIT: Juniper Firewall Escalated Privilege COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Logins by Authentication Type COBIT: Microsoft SQL Server Database Failed Logins COBIT: Microsoft SQL Server Database Logins COBIT: Oracle Database Logins COBIT: Permissions Modified on Windows Servers COBIT: Policies Modified on Windows Servers COBIT: Successful Logins COBIT: Sybase ASE Failed Logins COBIT: Sybase ASE Successful Logins COBIT: Unauthorized Logins COBIT: Unencrypted Logins COBIT: UNIX Failed Logins COBIT: Users Created on Servers COBIT: VPN Users Accessing Corporate Network COBIT: Windows Accounts Enabled COBIT: Windows Events by Users COBIT: Windows Programs Accessed 64 SOX and COBIT Compliance Suite Quick Start Guide
65 DS5.3 Identity Management (4/4) Compliance Suite Alerts COBIT: Accounts Enabled COBIT: Accounts Locked COBIT: Cisco PIX Logon Failure COBIT: Cisco PIX Logon Success COBIT: Cisco PIX Privilege Escalated COBIT: Juniper Firewall Logon Failure COBIT: Juniper Firewall Logon Success COBIT: Logins Failed COBIT: Logins Succeeded COBIT: Neoteris Files Accessed COBIT: NetApp Authentication Failure COBIT: NetApp Filer NIS Group Update COBIT: NetApp Filer Unauthorized Mounting COBIT: UNIX Groups Added COBIT: UNIX Groups Deleted COBIT: UNIX Groups Modified COBIT: UNIX Privilege Escalated COBIT: Windows Files Accessed COBIT: Windows Groups Created COBIT: Windows Group Members Added COBIT: Windows Permissions Changed COBIT: Windows Policies Changed COBIT: Windows Privileges Escalated SOX and COBIT Compliance Suite Quick Start Guide 65
66 DS5.4 User Account Management Compliance Suite Reports COBIT: Account Activities on UNIX Servers COBIT: Account Activities on Windows Servers COBIT: Accounts Created on NetApp Filer COBIT: Accounts Created on Sidewinder COBIT: Accounts Created on Symantec Endpoint Protection COBIT: Accounts Created on TIBCO Administrator COBIT: Accounts Created on UNIX Servers COBIT: Accounts Created on Windows Servers COBIT: Accounts Deleted on NetApp Filer COBIT: Accounts Deleted on NetApp Filer Audit COBIT: Accounts Deleted on Sidewinder COBIT: Accounts Deleted on Symantec Endpoint Protection COBIT: Accounts Deleted on UNIX Servers COBIT: Accounts Deleted on Windows Servers COBIT: Accounts Removed from Groups on Windows Serve rs COBIT: Cisco ISE, ACS Password Changes COBIT: DB2 Database User Additions and Deletions COBIT: ESX Accounts Activities COBIT: ESX Group Activities COBIT: F5 BIG-IP TMOS Password Changes COBIT: Group Activities on NetApp Filer Audit COBIT: Group Activities on Symantec Endpoint Protection COBIT: Group Activities on UNIX Servers COBIT: Group Activities on Windows Servers COBIT: Groups Created on UNIX Servers COBIT: Groups Created on Windows Servers COBIT: Groups Deleted on UNIX Servers COBIT: Groups Deleted on Windows Servers COBIT: i5/os Access Control List Modifications COBIT: i5/os Audit Configuration Changes COBIT: i5/os DST Password Reset COBIT: i5/os Server Security User Information Actions COBIT: i5/os User Profile Creation, Modification, or Restoration COBIT: Microsoft Operations Manager - Windows Account Activities COBIT: Microsoft Operations Manager - Windows Password Changes COBIT: Microsoft Operations Manager - Windows Permissions Modified COBIT: Microsoft Sharepoint Permissions Changed 66 SOX and COBIT Compliance Suite Quick Start Guide
67 DS5.4 User Account Management Compliance Suite Reports - Continued COBIT: Microsoft Sharepoint Policy Add, Remove, or Modify COBIT: Microsoft SQL Server Database User Additions and Deletions COBIT: Microsoft SQL Server Password Changes COBIT: NetApp Filer Password Changes COBIT: Oracle Database User Additions and Deletions COBIT: Password Changes on Windows Servers COBIT: Permissions Modified on Windows Servers COBIT: RACF Password Changed COBIT: RACF Permissions Changed COBIT: Sybase ASE Database User Additions and Deletions COBIT: Symantec Endpoint Protection Password Changes COBIT: TIBCO Administrator Password Changes COBIT: TIBCO Administrator Permission Changes COBIT: Users Removed from Servers COBIT: vcenter User Permission Change COBIT: vcloud User Created COBIT: vcloud User Deleted or Removed Compliance Suite Alerts COBIT: Accounts Created COBIT: Accounts Deleted COBIT: Accounts Locked COBIT: Cisco ISE, ACS Passwords Changed COBIT: DB2 Database User Added or Dropped COBIT: Groups Created COBIT: Group Members Added COBIT: i5/os Permission or Policy Change COBIT: IBM AIX Password Changed COBIT: Microsoft Operations Manager - Permissions Changed COBIT: Microsoft Operations Manager - Windows Passwords Changed COBIT: Microsoft Sharepoint Permission Changed COBIT: Microsoft Sharepoint Policies Added, Removed, Modified COBIT: Oracle Database User Added or Deleted COBIT: RACF Passwords Changed COBIT: RACF Permissions Changed COBIT: Symantec Endpoint Protection Policy Add, Remove, Modify SOX and COBIT Compliance Suite Quick Start Guide 67
68 DS5.4 User Account Management Compliance Suite Alerts - Continued DS5.5 Security Testing, Surveillance, and Monitoring COBIT: UNIX Groups Added COBIT: vcenter Permission Change COBIT: vcloud User Created COBIT: Windows Groups Created COBIT: Windows Group Members Added COBIT: Windows Passwords Changed COBIT: Windows Permissions Changed Compliance Suite Reports COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs DS5.7 Protection of Security Technology Compliance Suite Reports COBIT: Decru DataFort Zeroization Eventss DS5.8 Cryptographic Key Management Compliance Suite Reports COBIT: Tripwire Modifications, Additions, and Deletions COBIT: Check Point SIC Revoked COBIT: Decru DataFort Cryptographic Key Events COBIT: Decru DataFort Zeroization Events COBIT: i5/os Key Ring File Events 68 SOX and COBIT Compliance Suite Quick Start Guide
69 DS5.10 Network Security (1/3) Compliance Suite Reports COBIT: Accepted VPN Connections - RADIUS COBIT: Active Connections for Cisco ASA COBIT: Active Connections for Cisco FWSM COBIT: Active Connections for Cisco PIX COBIT: Allowed URLs by Source IPs COBIT: Allowed URLs by Source IPs - F5 BIG-IP TMOS COBIT: Allowed URLs by Source IPs - Microsoft IIS COBIT: Allowed URLs by Source Users COBIT: Allowed URLs by Source Users - F5 BIG-IP TMOS COBIT: Allowed URLs by Source Users - Microsoft IIS COBIT: Applications Under Attack COBIT: Applications Under Attack - Cisco IOS COBIT: Applications Under Attack - ISS SiteProtector COBIT: Applications Under Attack - SiteProtector COBIT: Attackers by Service COBIT: Attackers by Service - Cisco IOS COBIT: Attackers by Service - ISS SiteProtector COBIT: Attackers by Service - SiteProtector COBIT: Attackers by Signature COBIT: Attackers by Signature - Cisco IOS COBIT: Attackers by Signature - ISS SiteProtector COBIT: Attackers by Signature - SiteProtector COBIT: Attacks Detected COBIT: Attacks Detected - Cisco IOS COBIT: Attacks Detected - ISS SiteProtector COBIT: Attacks Detected - SiteProtector COBIT: Blocked URLs by Source IPs COBIT: Blocked URLs by Source IPs - F5 BIG-IP TMOS COBIT: Blocked URLs by Source IPs - Microsoft IIS COBIT: Blocked URLs by Source Users COBIT: Blocked URLs by Source Users - F5 BIG-IP TMOS COBIT: Blocked URLs by Source Users - Microsoft IIS COBIT: Check Point Management Station Login COBIT: Cisco ESA: Attacks by Event ID COBIT: Cisco ESA: Attacks Detected COBIT: Cisco ESA: Attacks by Threat Name COBIT: Cisco ESA: Scans COBIT: Connections by Users COBIT: Denied Connections by IP Addresses - Check Point COBIT: Denied Connections by IP Addresses - Cisco ASA COBIT: Denied Connections by IP Addresses - Cisco FWSM COBIT: Denied Connections by IP Addresses - Cisco PIX COBIT: Denied Connections by IP Addresses - Nortel COBIT: Denied Connections - Cisco IOS SOX and COBIT Compliance Suite Quick Start Guide 69
70 DS5.10 Network Security (3/3) Compliance Suite Reports COBIT: Denied Connections - Cisco NXOS COBIT: Denied Connections - Cisco Router COBIT: Denied Connections - F5 BIG-IP TMOS COBIT: Denied Connections - Sidewinder COBIT: Denied Connections - VMware vshield COBIT: Denied Inbound Connections - Cisco ASA COBIT: Denied Inbound Connections - Cisco FWSM COBIT: Denied Inbound Connections - Cisco PIX COBIT: Denied Inbound Connections - Check Point Interface COBIT: Denied Inbound Connections - Juniper Firewall COBIT: Denied Outbound Connections - Check Point Interface COBIT: Denied Outbound Connections - Cisco ASA COBIT: Denied Outbound Connections - Cisco FWSM COBIT: Denied Outbound Connections - Cisco PIX COBIT: Denied Outbound Connections - Juniper Firewall COBIT: ESX Logins Succeeded COBIT: F5 BIG-IP TMOS Login Successful COBIT: FortiOS: Attacks by Event ID COBIT: FortiOS: Attacks by Threat Name COBIT: FortiOS: Attacks Detected COBIT: FortiOS DLP Attacks Detected COBIT: FortiOS: Attacks by Event ID COBIT: FortiOS: Attacks by Threat Name COBIT: FortiOS: Attacks Detected COBIT: FortiOS DLP Attacks Detected COBIT: i5/os Internet Security Management Events COBIT: Juniper SSL VPN Successful Logins COBIT: Juniper SSL VPN (Secure Access) Successful Logins COBIT: Logins by Authentication Type COBIT: McAfee AntiVirus: Attacks by Event ID COBIT: McAfee AntiVirus: Attacks by Threat Name COBIT: McAfee AntiVirus: Attacks Detected COBIT: Most Active Ports Through Firewall - Check Point Interface COBIT: Most Active Ports Through Firewall - Cisco ASA COBIT: Most Active Ports Through Firewall - Cisco FWSM COBIT: Most Active Ports Through Firewall - Cisco PIX COBIT: Most Active Ports Through Firewall - Fortinet COBIT: Most Active Ports Through Firewall - Juniper Firewall COBIT: Most Active Ports Through Firewall - Nortel COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer Login Successful COBIT: Network Traffic per Rule - Check Point COBIT: Network Traffic per Rule - Juniper Firewall COBIT: Network Traffic per Rule - Nortel 70 SOX and COBIT Compliance Suite Quick Start Guide
71 DS5.10 Network Security (3/3) Compliance Suite Reports - Continued COBIT: PANOS: Attacks by Event ID COBIT: PANOS: Attacks by Threat Name COBIT: PANOS: Attacks Detected COBIT: Ports Allowed Access - Check Point Interface COBIT: Ports Allowed Access - Cisco ASA COBIT: Ports Allowed Access - Cisco IOS COBIT: Ports Allowed Access - Cisco FWSM COBIT: Ports Allowed Access - Cisco Netflow COBIT: Ports Allowed Access - Cisco PIX COBIT: Ports Allowed Access - F5 BIG-IP TMOS COBIT: Ports Allowed Access - Fortinet COBIT: Ports Allowed Access - Juniper JunOS COBIT: Ports Allowed Access - Juniper Firewall COBIT: Ports Allowed Access - Juniper RT Flow COBIT: Ports Allowed Access - Nortel COBIT: Ports Allowed Access - PANOS COBIT: Ports Allowed Access - VMware vshield COBIT: Ports Denied Access - Check Point Interface COBIT: Ports Denied Access - Cisco ASA COBIT: Ports Denied Access - Cisco FWSM COBIT: Ports Denied Access - Cisco IOS COBIT: Ports Denied Access - Cisco PIX COBIT: Ports Denied Access - Cisco Router COBIT: Ports Denied Access - F5 BIG-IP TMOS COBIT: Ports Denied Access - Fortinet COBIT: Ports Denied Access - Juniper JunOS COBIT: Ports Denied Access - Juniper Firewall COBIT: Ports Denied Access - Juniper RT Flow COBIT: Ports Denied Access - Nortel COBIT: Ports Denied Access - PANOS COBIT: Ports Denied Access - VMware vshield COBIT: Servers Under Attack COBIT: Servers Under Attack - Cisco IOS COBIT: Servers Under Attack - ISS SiteProtector COBIT: Servers Under Attack - SiteProtector COBIT: Source of Attacks COBIT: Source of Attacks - Cisco IOS COBIT: Source of Attacks - ISS SiteProtector COBIT: Source of Attacks - SiteProtector COBIT: Symantec AntiVirus: Attacks by Threat Name COBIT: Symantec AntiVirus: Attacks Detected COBIT: Symantec AntiVirus: Scans COBIT: Successful Logins COBIT: Symantec AntiVirus: Attacks by Threat Name COBIT: Symantec AntiVirus: Attacks Detected SOX and COBIT Compliance Suite Quick Start Guide 71
72 DS5.10 Network Security Compliance Suite Reports - Continued COBIT: Symantec AntiVirus: Scans COBIT: Symantec Endpoint Protection: Attacks by Threat Name COBIT: Symantec Endpoint Protection: Attacks by Event ID COBIT: Symantec Endpoint Protection: Scans COBIT: TrendMicro Control Manager: Attacks Detected COBIT: TrendMicro Control Manager: Attacks Detected by Threat COBIT: TrendMicro OfficeScan: Attacks Detected COBIT: TrendMicro OfficeScan: Attacks Detected by Threat Name COBIT: Unencrypted Logins COBIT: Unencrypted Network Services - Check Point Interface COBIT: Unencrypted Network Services - Cisco ASA COBIT: Unencrypted Network Services - Cisco FWSM COBIT: Unencrypted Network Services - Cisco IOS COBIT: Unencrypted Network Services - Cisco Netflow COBIT: Unencrypted Network Services - Cisco PIX COBIT: Unencrypted Network Services - F5 BIG-IP TMOS COBIT: Unencrypted Network Services - Fortinet COBIT: Unencrypted Network Services - Juniper Firewall COBIT: Unencrypted Network Services - Juniper JunOS COBIT: Unencrypted Network Services - Juniper RT Flow COBIT: Unencrypted Network Services - Nortel COBIT: Unencrypted Network Services - PANOS COBIT: Unencrypted Network Services - Sidewinder COBIT: Unencrypted Network Services - VMware vshield COBIT: Users Using the Proxies COBIT: vcenter Successful Logins COBIT: vcloud Successful Logins COBIT: VPN Sessions by Destination IPs COBIT: VPN Sessions by Source IPs COBIT: VPN Sessions by Users COBIT: VPN Denied Connections by Users COBIT: Web Access from All Users COBIT: Web Access to Applications COBIT: Web Access to Applications - F5 BIG-IP TMOS COBIT: Web Access to Applications - Microsoft IIS COBIT: Web Access from All Users - F5 BIG-IP TMOS COBIT: Web Access from All Users - Microsoft IIS COBIT: Web URLs Visited COBIT: Web URLs Visited - F5 BIG-IP TMOS COBIT: Web URLs Visited - Microsoft IIS COBIT: Web URLs Visited via Proxy COBIT: Web URLs Visited via Proxy - Microsoft IIS 72 SOX and COBIT Compliance Suite Quick Start Guide
73 DS5.10 Network Security Compliance Suite Alerts COBIT: Active Directory Changes COBIT: Disallowed Services COBIT: Juniper Firewall Logon Success COBIT: Logins Succeeded COBIT: Excessive IDS Attack COBIT: vcenter User Login Successful COBIT: vcloud Director Login Success SOX and COBIT Compliance Suite Quick Start Guide 73
74 DS9 Manage the Configuration DS9.3 Configuration Integrity Review Compliance Suite Reports COBIT: Check Point Management Station Login COBIT: Cisco Configuration Changes COBIT: Cisco PIX, ASA, FWSM Policy Changed COBIT: ESX Kernel log daemon terminating COBIT: ESX Kernel logging Stop COBIT: ESX Logins Succeeded COBIT: ESX Syslogd Restart COBIT: F5 BIG-IP TMOS Login Successful COBIT: Juniper Firewall Policy Changed COBIT: Juniper SSL VPN (Secure Access) Policy Changed COBIT: Logins by Authentication Type COBIT: Microsoft SQL Server Schema Corruption COBIT: NetApp Filer Audit Login Successful COBIT: NetApp Filer Audit Policies Modified COBIT: NetApp Filer Login Successful COBIT: RACF Successful Logins COBIT: Successful Logins COBIT: Symantec Endpoint Protection Policy Add, Remove, or Modify COBIT: Tripwire Modifications, Additions, and Deletions COBIT: Unencrypted Logins COBIT: vcenter Change Attributes COBIT: vcenter Orchestrator Change Attributes COBIT: vcenter Orchestrator Virtual Machine Created COBIT: vcenter Orchestrator Virtual Machine Deleted COBIT: vcenter Modify Firewall Policy COBIT: vcenter Orchestrator vswitch Added, Changed or Removed COBIT: vcenter Resource Usage Change COBIT: vcenter Restart ESX Services COBIT: vcenter Successful Logins COBIT: vcenter Virtual Machine Created COBIT: vcenter Virtual Machine Deleted COBIT: vcenter vswitch Changed or Removed COBIT: vcloud Organization Created 74 SOX and COBIT Compliance Suite Quick Start Guide
75 DS9.3 Configuration Integrity Review Compliance Suite Reports - Continued COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud Successful Logins COBIT: vcloud vapp Created, Modified, or Deleted COBIT: vcloud vdc Create, Modify, or Delete COBIT: vshield Edge Configuration Changes COBIT: Windows Programs Accessed Compliance Suite Alerts COBIT: Cisco PIX Logon Success COBIT: Cisco PIX Policy Changed COBIT: Cisco Switch Policy Changed COBIT: Juniper Firewall Policy Changes COBIT: Juniper Firewall Logon Success COBIT: Juniper Policy Out of Sync COBIT: Juniper VPN Policy Change COBIT: Logins Succeeded COBIT: Microsoft Operations Manager - Windows Policies Changed COBIT: NetApp Filer Audit Policies Changed COBIT: RACF Process Started COBIT: vcenter Create Virtual Machine COBIT: vcenter Delete Virtual Machine COBIT: vcenter Firewall Policy Change COBIT: vcenter Orchestrator vswitch Add, Modify or Delete COBIT: vcenter Restart ESX Services COBIT: vcenter User Login Successful COBIT: vcenter vswitch Modify or Delete COBIT: vcloud Director Login Success COBIT: vcenter Orchestrator Create Virtual Machine COBIT: vcenter Orchestrator Delete Virtual Machine COBIT: vcloud Organization Created COBIT: vcloud Organization Deleted COBIT: vcloud Organization Modified COBIT: vcloud vapp Created, Deleted, or Modified COBIT: vcloud vdc Created, Modified, or Deleted COBIT: vshield Edge Configuration Change COBIT: Windows Policies Changed COBIT: Windows Programs Accessed SOX and COBIT Compliance Suite Quick Start Guide 75
76 DS10 Manage Problems DS10.2 Problem Tracking and Resolution Compliance Suite Report DS11 Manage Data DS11.2 Storage and Retention Arrangements COBIT: DHCP Granted/Renewed Activities on Microsoft DHCP COBIT: DHCP Granted/Renewed Activities on VMware vshield COBIT: LogLogic File Retrieval Errors COBIT: LogLogic Message Routing Errors Compliance Suite Alert COBIT: LogLogic Message Routing Errors COBIT: LogLogic File Retrieval Errors Compliance Suite Reports COBIT: DB2 Database Backup Failed COBIT: i5/os Restore Events COBIT: Microsoft SQL Server Backup Failed COBIT: NetApp Filers Backup Errors COBIT: Sybase ASE Database Backup and Restoration Compliance Suite Alert COBIT: DB2 Database Backup Failed COBIT: Microsoft SQL Server Backup Failed COBIT: NetApp Filer Snapshot Error DS11.5 Backup and Restoration Compliance Suite Reports COBIT: Sybase ASE Database Backed Up or Restored COBIT: DB2 Database Backup Failed COBIT: DB2 Database Restore Failed COBIT: i5/os Restore Events COBIT: Microsoft SQL Server Backup Failed COBIT: Microsoft SQL Server Restore Failed COBIT: NetApp Filer Backup Errors COBIT: Sybase ASE Database Backup and Restoration Compliance Suite Alerts COBIT: DB2 Database Backup Failed COBIT: DB2 Database Restore Failed COBIT: Microsoft SQL Server Backup Failed COBIT: Microsoft SQL Server Restore Failed COBIT: NetApp Filer Snapshot Error COBIT: Sybase ASE Database Backed Up or Restored 76 SOX and COBIT Compliance Suite Quick Start Guide
77 DS11.6 Security Requirements for Data Management Compliance Suite Reports COBIT: Active Directory System Changes COBIT: Microsoft Operations Manager - Windows Policies Modified COBIT: Policies Modified on Windows Servers COBIT: Ports Allowed Access - Check Point Interface COBIT: Ports Allowed Access - Cisco ASA COBIT: Ports Allowed Access - Cisco FWSM COBIT: Ports Allowed Access - Cisco IOS COBIT: Ports Allowed Access - Cisco Netflow COBIT: Ports Allowed Access - Cisco PIX COBIT: Ports Allowed Access - F5 BIG-IP TMOS COBIT: Ports Allowed Access - Fortinet COBIT: Ports Allowed Access - Juniper Firewall COBIT: Ports Allowed Access - Juniper JunOS COBIT: Ports Allowed Access - Juniper RT Flow COBIT: Ports Allowed Access - Nortel COBIT: Ports Allowed Access - PANOS COBIT: Ports Allowed Access - VMware vshield COBIT: Unencrypted Network Services - Check Point Interface COBIT: Unencrypted Network Services - Cisco ASA COBIT: Unencrypted Network Services - Cisco FWSM COBIT: Unencrypted Network Services - Cisco IOS COBIT: Unencrypted Network Services - Cisco Netflow COBIT: Unencrypted Network Services - Cisco PIX COBIT: Unencrypted Network Services - F5 BIG-IP TMOS COBIT: Unencrypted Network Services - Fortinet COBIT: Unencrypted Network Services - Juniper Firewall COBIT: Unencrypted Network Services - Juniper JunOS COBIT: Unencrypted Network Services - Juniper RT Flow COBIT: Unencrypted Network Services - Nortel COBIT: Unencrypted Network Services - PANOS COBIT: Unencrypted Network Services - Sidewinder COBIT: Unencrypted Network Services - VMware vshield SOX and COBIT Compliance Suite Quick Start Guide 77
78 DS13 Manage Operations DS13.3 IT Infrastructure Monitoring Compliance Suite Reports COBIT: LogLogic File Retrieval Errors COBIT: LogLogic Message Routing Errors COBIT: NetApp Filer Audit Logs Cleared COBIT: Periodic Review of Log Reports COBIT: Periodic Review of User Access Logs COBIT: Windows Audit Logs Cleared Compliance Suite Alert COBIT: LogLogic Message Routing Errors COBIT: LogLogic File Retrieval Errors 78 SOX and COBIT Compliance Suite Quick Start Guide
TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
TIBCO LogLogic PCI Compliance Suite Release Notes
TIBCO LogLogic PCI Compliance Suite Release Notes Software Release 3.7.0 August 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
TIBCO LogLogic ITIL and ITSM Compliance Suite Release Notes
TIBCO LogLogic ITIL and ITSM Compliance Suite Release Notes Software Release 3.7.0 August 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
TIBCO LogLogic. PCI Compliance Suite Guidebook. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic PCI Compliance Suite Guidebook Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
LogLogic Symantec Endpoint Protection Log Configuration Guide
LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL60005-00ELS100001 This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and
LogLogic Trend Micro OfficeScan Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release
LogLogic Cisco IPS Log Configuration Guide
LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1
TIBCO Slingshot User Guide
TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO
LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide
LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector
LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide
LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide Document Release: September 2011 Part Number: LL600026-00ELS090000 This manual supports LogLogic Microsoft DHCP Release
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
TIBCO Reward 15.3.0 Release Notes August 2015
TIBCO Reward 15.3.0 Release Notes August 2015 2 TOC Contents Important Information...3 Preface...4 TIBCO Reward Related Documentation...5 Typographical Conventions...6 TIBCO Resources...8 How to Join TIBCOmmunity...8
TIBCO LogLogic Unity Quick Reference Guide Concepts
TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting
TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual
TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
How To Use Libap With A Libap Server With A Mft Command Center And Internet Server
MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
TIBCO Rendezvous Network Server Glossary
TIBCO Rendezvous Network Server Glossary Software Release 1.1 March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
TIBCO ActiveMatrix BPM Integration with Content Management Systems Software Release 2.2.0 September 2013
TIBCO ActiveMatrix BPM Integration with Content Management Systems Software Release 2.2.0 September 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide
TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide Software Release 5.4.2 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
TIBCO ActiveMatrix BusinessWorks SmartMapper Plug-in Release Notes
TIBCO ActiveMatrix BusinessWorks SmartMapper Plug-in Release Notes Software Release 6.0.0 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
TIBCO Spotfire Server Migration. Migration Manual
TIBCO Spotfire Server Migration Migration Manual Revision date: 26 October 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
Juniper Secure Access SSL VPN Log Configuration Guide
Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,
How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint Release Notes
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint Release Notes Software Release 6.0.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
Nasuni Management Console Guide
Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
TIBCO Enterprise Administrator Release Notes
TIBCO Enterprise Administrator Release Notes Software Release 2.2.0 March 2015 Two-Second Advantage 2 Important SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
TIBCO Runtime Agent Authentication API User s Guide. Software Release 5.8.0 November 2012
TIBCO Runtime Agent Authentication API User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
TIBCO Hawk SNMP Adapter Installation
TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013
TIBCO Spotfire Metrics Modeler User s Guide Software Release 6.0 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
TIBCO Fulfillment Provisioning Session Layer for FTP Installation
TIBCO Fulfillment Provisioning Session Layer for FTP Installation Software Release 3.8.1 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
LogLogic Blue Coat ProxySG Syslog Log Configuration Guide
LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic
TIBCO Managed File Transfer Platform Server for UNIX Release Notes
TIBCO Managed File Transfer Platform Server for UNIX Release Notes Software Release 7.2.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
TIBCO LogLogic. Security Event Manager (SEM) User Guide. Software Release: 3.5.2. October 2012
TIBCO LogLogic Security Event Manager (SEM) User Guide Software Release: 3.5.2 October 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright
TIBCO Spotfire Automation Services Installation and Configuration
TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
TIBCO ActiveMatrix BusinessWorks Plug-in for Big Data Release Notes
TIBCO ActiveMatrix BusinessWorks Plug-in for Big Data Release Notes Software Release 6.1.0 August 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
TIBCO iprocess Web Services Server Plug-in Installation. Software Release 11.3.0 October 2011
TIBCO iprocess Web Services Server Plug-in Installation Software Release 11.3.0 October 2011 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
Quick Start Guide. for Installing vnios Software on. VMware Platforms
Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,
TIBCO Spotfire Metrics Prerequisites and Installation
TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF
IBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
TIBCO Spotfire Automation Services 6.5. User s Manual
TIBCO Spotfire Automation Services 6.5 User s Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
TIBCO Silver Fabric Continuity User s Guide
TIBCO Silver Fabric Continuity User s Guide Software Release 1.0 November 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
TIBCO ActiveMatrix BPM - Integration with Content Management Systems
TIBCO ActiveMatrix BPM - Integration with Content Management Systems Software Release 3.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
TIBCO Foresight Operational Monitor
TIBCO Foresight Operational Monitor Operational Monitor User s Guide Software Release 5.1.0 November 2015 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
Trend Micro Email Encryption Gateway 5
Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
TIBCO ActiveMatrix BusinessWorks Plug-in for sftp Release Notes
TIBCO ActiveMatrix BusinessWorks Plug-in for sftp Release Notes Software Release 1.0.0 June 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
Defender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
TIBCO MFT Platform Server for IBM i User Guide. Software Release 7.1.0 April 2013
TIBCO MFT Platform Server for IBM i User Guide Software Release 7.1.0 April 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
LogLogic IBM i5/os Collector Guide
LogLogic IBM i5/os Collector Guide Software Release: 1.0 Document Release: December 2010 Part Number: LL600020-00EI5010001 This manual supports LogLogic IBM i5/os Collector Release 1.0 and later, and LogLogic
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
TIBCO Rendezvous Administration. Software Release 8.3.0 July 2010
TIBCO Rendezvous Administration Software Release 8.3.0 July 2010 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY
Admin Quick Start Guide
Getting Started TIBCO Slingshot Admin Quick Start Guide v1.8.1 1. September 2, 2011 Configuring Slingshot Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Symantec NetBackup Getting Started Guide. Release 7.1
Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for
List of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
TIBCO LogLogic. Universal Collector (UC) User Guide. Software Release: 2.3.0 November 2012
TIBCO LogLogic Universal Collector (UC) User Guide Software Release: 2.3.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
Alert Logic Log Manager
whitepaper Alert Logic Log Manager Configuring Log Sources for Best Practice Reports CONTENTS Introduction 1 Best Practice Reports in Log Manager 2 Active Directory 2 Databases 2 Network Devices 2 Windows
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Configuring Symantec AntiVirus for NetApp Storage system
Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
ADOBE CONNECT ENTERPRISE SERVER 6
Chapter 1: ADOBE CONNECT ENTERPRISE SERVER 6 SSL CONFIGURATION GUIDE Copyright 2006 Adobe Systems Incorporated. All rights reserved. Adobe Connect Enterprise Server 6, for Windows If this guide is distributed
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1
IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route
TIBCO Administrator User s Guide. Software Release 5.7.1 March 2012
TIBCO Administrator User s Guide Software Release 5.7.1 March 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
High Availability Branch Office VPN
Technical White Paper jwgoerlich.us High Availability Branch Office VPN J Wolfgang Goerlich Written October 2007 Business Objective A business has a main office and a branch office. These are to be connected
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint User s Guide
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint User s Guide Software Release 1.0 Feburary 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks
TIBCO ActiveMatrix BusinessWorks Process Monitor Server. Installation
TIBCO ActiveMatrix BusinessWorks Process Monitor Server Installation Software Release 2.1.2 Published: May 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
