Skip to main content
Skip table of contents

CMMC – Reports and Reporting Packages

The Intelligent Indexing settings are recommendations. The default configuration is No.

Summary Reports 


Report NameReport IDControl SupportData SourceLog Sources
CCF: Access Failure Summary2089AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Access Success Summary2091AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Account Deleted Summary2086AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.2, PS.L2-3.9.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Account Disabled Summary2084AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.2, PS.L2-3.9.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: Account Enabled Summary2085AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.2, PS.L2-3.9.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Account Modification Summary2092AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Applications Accessed By User Summary2063AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Audit Log Summary2076AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.21, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.13, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.7, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.9, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.10, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MA.L2-3.7.6, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, MP.L2-3.8.5, PS.L2-3.9.2, PE.L1-3.10.1, PE.L1-3.10.3, PE.L1-3.10.4, PE.L1-3.10.5, PE.L2-3.10.2, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Auth Failure Summary2088AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Auth Success Summary2090AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Backup Activity Summary2062AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Compromises Detected Summary2064AC.L2-3.1.12, AC.L2-3.1.3, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: Config/Policy Change Summary2049AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.13, AU.L2-3.3.2, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.9, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, RM.L2-3.11.1, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L1-3.13.5, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.7, SC.L2-3.13.15, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: Critical Environment Error Summary2050AC.L2-3.1.12, AC.L2-3.1.3, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: GeoIP Summary2069AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: LogRhythm Data Loss Defender Log Summary2066AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.21, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.13, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, PS.L2-3.9.2, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: Malware Detected Summary2051AC.L2-3.1.12, AC.L2-3.1.3, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Object Access Summary2067AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.21, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.15, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Patch Activity Summary2052AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.9, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Physical Access Summary2053AC.L1-3.1.1, AC.L1-3.1.2, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.3, AC.L2-3.1.7, AU.L2-3.3.8, AU.L2-3.3.9, AU.L2-3.3.9, AU.L2-3.3.6, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.6, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, MP.L2-3.8.5, PS.L2-3.9.2, PE.L1-3.10.1, PE.L1-3.10.3, PE.L1-3.10.4, PE.L1-3.10.5, PE.L2-3.10.2, MP.L2-3.8.9, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SI.L1-3.14.1, SI.L1-3.14.2, SI.L2-3.14.3, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Priv Account Management Activity Summary2080AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Priv Authentication Activity Summary2079AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Rogue Access Point Summary2054AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Signature Activity Summary2055AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.9, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: Social Media Summary2070AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.4, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.15, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Suspected Wireless Attack Summary2056AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Term Account Activity Summary2087AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.2, PS.L2-3.9.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Time Sync Error Summary2057AC.L2-3.1.12, AC.L2-3.1.3, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.7, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.9, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: Top Suspicious Users2059AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Use Of Non-Encrypted Protocols Summary2060AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.13, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.10, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7LogMartAll Available Log Sources
CCF: User Misuse Summary2061AC.L1-3.1.1, AC.L1-3.1.2, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.12, AC.L2-3.1.3, AC.L2-3.1.7, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MP.L2-3.8.1, MP.L2-3.8.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources
CCF: User Object Access Summary2068AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.21, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: User Priv Escalation (SU & SUDO) Summary2078AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: User Priv Escalation (Windows) Summary2077AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.9, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L1-3.5.1, IA.L1-3.5.2, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.3, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, PS.L2-3.9.2, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Data Processor(s)All Available Log Sources
CCF: Vulnerability Detected Summary2058AC.L2-3.1.12, AC.L2-3.1.3, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.8, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.2, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.13, SC.L2-3.13.15, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7Platform ManagerAll Available Log Sources

Detailed Reports

Report Name

Report Description

Augmented RequirementsData SourceIntelligent IndexingClassificationLog Sources

Report ID

CCF: Host Access Granted And Revoked Detail

This report details all access granted and revoked for production systems.

AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.13, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.10, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7

Data Processor(s)YesAuditAll Available Log Sources

2065

CCF: Unknown User Account Detail

This report provides details of activity from unknown user accounts, based off CCF user lists.

AC.L1-3.1.1, AC.L1-3.1.2, AC.L1-3.1.20, AC.L2-3.1.5, AC.L2-3.1.6, AC.L2-3.1.8, AC.L2-3.1.10, AC.L2-3.1.16, AC.L2-3.1.12, AC.L2-3.1.14, AC.L2-3.1.3, AC.L2-3.1.7, AC.L2-3.1.17, AC.L2-3.1.18, AC.L2-3.1.13, AC.L2-3.1.15, AC.L2-3.1.19, AU.L2-3.3.2, AU.L2-3.3.1, AU.L2-3.3.3, AU.L2-3.3.4, AU.L2-3.3.8, AU.L2-3.3.5, AU.L2-3.3.6, CM.L2-3.4.6, CM.L2-3.4.2, CM.L2-3.4.3, CM.L2-3.4.8, IA.L2-3.5.7, IA.L2-3.5.8, IA.L2-3.5.9, IA.L2-3.5.10, IA.L2-3.5.4, IA.L2-3.5.5, IA.L2-3.5.6, IR.L2-3.6.1, IR.L2-3.6.2, IR.L2-3.6.3, MA.L2-3.7.1, MA.L2-3.7.2, MP.L2-3.8.1, MP.L2-3.8.2, MP.L2-3.8.7, MP.L2-3.8.8, RM.L2-3.11.1, RM.L2-3.11.3, CA.L2-3.12.1, CA.L2-3.12.3, SC.L1-3.13.1, SC.L1-3.13.5, SC.L2-3.13.12, SC.L2-3.13.11, SC.L2-3.13.2, SC.L2-3.13.3, SC.L2-3.13.4, SC.L2-3.13.6, SC.L2-3.13.7, SC.L2-3.13.8, SC.L2-3.13.13, SC.L2-3.13.15, SC.L2-3.13.16, SI.L1-3.14.1, SI.L1-3.14.2, SI.L1-3.14.4, SI.L1-3.14.5, SI.L2-3.14.3, SI.L2-3.14.6, SI.L2-3.14.7

Data Processor(s)YesSecurityAll Available Log Sources

2071

Reporting Packages

Report Package Name

Report Package Description

Report Package ID

CCF: Daily IT Operations Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Operations on a daily basis.

89

CCF: Daily IT Security Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Security on a daily basis.

90

CCF: Executive Reporting Package

This reporting package is a template to deliver pertinent content for Executives on a monthly basis.

87

CCF: Weekly Audit Reporting Package

This Reporting Package is a template to deliver pertinent content for Internal and/or External Audit groups on a weekly basis.

88

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.