Event Collection ConfigurationΒΆ
Detailed device configuration is available for IDS/IPS devices, Firewalls, Routers, Servers, and assorted Operating Systems and applications, along with desktop configuration and The following section identifies the required information, settings, and detailed configuration settings.
- 1. Tier 1 IDS/IPS Device Configurations
- 1.1. HAWK Snort IDS/IPS CentOS Installation Package
- 1.2. Snort IDS/IPS Barnyard/Barnyard2 Output Configuration
- 1.3. HAWK eyeCon/Sourcefire Defense Center eStream API
- 1.4. HAWK eyeCon/Juniper IDS/IPS Device Configuration
- 1.5. HAWK eyeCon/TippingPoint IDS/IPS Device Configuration
- 1.6. HAWK eyeCon/Fortinet FortiGate Analyzer IDS/IPS Device
- 1.7. HAWK eyeCon/Enterasys Dragon Remote Syslog Configuration
- 1.8. HAWK eyeCon/Barracuda Networks Spam Firewall Remote Syslog Configuration
- 2. Tier 2 Firewall/Router Device Configuration
- 3. Tier 3 Server/Application Configuration
- 3.1. Microsoft Windows 7, 8, 10 Audit Settings and Recommendations (PCI Compliant)
- 3.1.1. Accessing Audit Settings
- 3.1.2. Recommended Audit Policies by Operating System
- 3.1.3. Audit Policy Tables Legend
- 3.1.4. Account Logon
- 3.1.5. Account Management
- 3.1.6. Detailed Tracking
- 3.1.7. Logon and Logoff
- 3.1.8. Object Access
- 3.1.9. Policy Change
- 3.1.10. Privilege Use
- 3.1.11. System
- 3.1.12. Global Object Access Auditing
- 3.1.13. References
- 3.2. Windows Server 2008 to Windows Server 2019 Audit Settings Recommendations (PCI Compliant)
- 3.2.1. Accessing Audit Settings
- 3.2.2. Recommended Audit Policies by Operating System
- 3.2.3. Audit Policy Tables Legend
- 3.2.4. Account Logon
- 3.2.5. Account Management
- 3.2.6. Detailed Tracking
- 3.2.7. DS Access
- 3.2.8. Logon and Logoff
- 3.2.9. Object Access
- 3.2.10. Policy Change
- 3.2.11. Privilege Use
- 3.2.12. System
- 3.2.13. Global Object Access Auditing
- 3.2.14. References
- 3.3. Microsoft Windows 2000, 2003, 2008 Server, Microsoft Windows 7, XP, Vista
- 3.4. GNU/Linux Remote Syslog Configuration
- 3.5. Mac OS X Remote Syslog Configuration
- 3.6. FreeBSD, NetBSD, and OpenBSD Syslog Remote Logging
- 3.7. Solaris Remote Syslog Configuration
- 3.8. IBM AIX 5L/6 Remote Syslog Configuration
- 3.9. McAfee ePolicy Orchestrator v4.0 and Below Configuration using SNMP
- 3.10. McAfee ePolicy Orchestrator v4.5+ Reporting Configuration using SNMP
- 3.11. McAfee ePolicy Orchestrator using ODBC
- 3.12. McAfee NSM Poller Configuration
- 3.13. Critical Watch
- 3.14. MicroSoft SQL
- 3.15. MySQL
- 3.16. Tenable Nessus Vulnerability Plugin
- 3.17. Rapid7 Nexpose Vulnerability Plugin
- 3.18. HAWK Syslog Plugin
- 3.19. SNMPv1 and SNMPv2c Query Plugin
- 3.20. SNMPv3 Query Plugin
- 3.21. Trend Micro Deep Security
- 3.1. Microsoft Windows 7, 8, 10 Audit Settings and Recommendations (PCI Compliant)
- 4. Tier 4 Desktop Computer Configuration