Skip to main content
Skip table of contents

CIS-CSC – Reports

ID

Report Name

Minimum Data Requirement

Recommended Data Requirement

DescriptionIntelligent Indexing

15

Policy Activity Summary

Various


Lists all policy activity by Impacted Host.

CIS Critical Security Control(s): CSC 16.7

No

67

Compliance: Top Attackers

IDS/Security Events

 

Lists all attackers ordered by the number of events detected highest to lowest.

CIS Critical Security Control(s): CSC 12.5

No

84

Compliance: System Critical And Error Conditions

Host or Device Logs

 

Summarizes critical and error conditions for production servers and network infrastructure devices.

CIS Critical Security Control(s): CSC 6.7

No

959

Rogue Host Detection Summary

AI Engine Events

 

For use with the LogRhythm Network Monitor. This report shows a summary of all hostnames picked up by the Rogue Host alarm.

CIS Critical Security Control(s): CSC 1.1, CSC 1.4

No

1004

Software Installation Summary

Host Logs

Endpoint Protection Logs

This report displays the number of software installation events logged during the reporting period.

CIS Critical Security Control(s): CSC 2.3

No

1005

Vulnerabilities By Entity

Vulnerability Scanner Logs

 

CIS Critical Security Control(s): CSC 3.1, CSC 3.6, CSC 3.7

No

1006

Vulnerabilities By Vulnerability

Vulnerability Scanner Logs

 

CIS Critical Security Control(s): CSC 3.1, CSC 3.6, CSC 3.7

No

1007

Malware Summary

Antivirus Events

Endpoint Protection Logs

This report provides a summary of malware activity by entity and impacted host within the organization infrastructure.

CIS Critical Security Control(s): CSC 8.1

No

1008

Backups Completed

Backup System Events

 

This report provides a summary of critical failures, errors, and information from backup software

CIS Critical Security Control(s): CSC 10.1

No

1015

Top Attackers Summary

IDS/Security Events

 

This report provides a summary of top attackers by origin host.
 
CIS Critical Security Control(s): CSC 6.7, CSC 6.6

No

1019

Top Targeted Applications

Firewall Logs

Next Gen Firewall

Lists all applications targeted for attack ordered by the number of events detected highest to lowest.

CIS Critical Security Control(s): CSC 18.10

No

1020

Configuration Change Summary

Host or Device Logs

 

This report summarizes configuration change activity (configurations deleted/disabled/enabled/loaded/modified) by Impacted Host

CIS Critical Security Control(s): CSC 11.3

No

1021

Denial Of Service Summary

IDS/Security Events

Next Gen Firewall

This report provides a summary of detected denial of service attempts by Entity and Impacted Host.

CIS Critical Security Control(s): CSC 9.5

No

1022

Host Compromise Summary

IDS/Security Events

 

This report provides a summary of compromise activity by Impacted Host.

CIS Critical Security Control(s): CSC 5.2

No

1023

Backup Critical/Error Summary

AI Engine Events

 

This report provides a summary of critical failures and errors from backup software by Impacted Host

CIS Critical Security Control(s): CSC 10.1

No

1024

Backup Restore Summary

Backup System Events

 

This report provides a summary of restore events and information from backup software.

CIS Critical Security Control(s): CSC 10.1, CSC 10.3

No

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.