GDPR – Reports and Reporting Packages
Summary Reports
The Intelligent Indexing settings are recommendations. The default configuration is No.
Report Name | Report Description | Report ID | Directly Meet Requirements | Data Source | Intelligent Indexing | Log Sources |
---|---|---|---|---|---|---|
CCF: Applications Accessed By User Summary | This report provides information about user accessed applications. | 2063 | N/A | Data Processor(s) | No | All Available Log Sources |
CCF: Backup Activity Summary | This report provides a summary of activity from backup events. | 2062 | N/A | Data Processor(s) | No | All Available Log Sources |
CCF: Compromises Detected Summary | This report provides a summary of detected compromises of security by Entity and Impacted Host. | 2064 | N/A | LogMart | Yes | All Available Log Sources |
CCF: Config/Policy Change Summary | This report provides a summary of the occurrence of configuration or policy changes across critical and production environments (entity structure). | 2049 | N/A | LogMart | No | All Available Log Sources |
CCF: Critical Environment Error Summary | This report provides summary details around critical or error messages received from critical servers or systems (entity structure) to support change management procedures. | 2050 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: GeoIP Summary | This report summarizes GeoIP activity that is associated with AI Engine GeoIP rules, in the CCF compliance automation suite. | 2069 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: LogRhythm Data Loss Defender Log Summary | This report provides summary information on data generated by the LogRhythm Data Loss Defender. Data is grouped by Entity, Impacted Host, Common Event, and Object with a count of how many times that condition has been experienced within the reporting period. | 2066 | N/A | LogMart | Yes | All Available Log Sources |
CCF: Malware Detected Summary | This report provides a summary of malware activity by entity and impacted host within the organization's critical and production environments (entity structure). | 2051 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: Object Access Summary | This report summarizes object access by Impacted Host. | 2067 | N/A | Data Processor(s) | No | All Available Log Sources |
CCF: Patch Activity Summary | This report provides a summary of applied patches grouped by Origin Host. It can demonstrate that all system components have the latest security patches installed. | 2052 | N/A | Data Processor(s) | No | All Available Log Sources |
CCF: Physical Access Summary | This report summarizes physical door access/authentication success and failures within the organization's physical security perimeter. | 2053 | N/A | Platform Manager | No | All Available Log Sources |
CCF: Rogue Access Point Summary | This report provides a summary of all detected rogue wireless access points by Impacted Host across critical and production environments (entity structure). | 2054 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: Signature Activity Summary | This report provides summary information on signature update activity across critical and production environments (entity structure). | 2055 | N/A | LogMart | No | All Available Log Sources |
CCF: Social Media Summary | Summarizes the top URLs related to Social Media activity. | 2070 | N/A | Platform Manager | No | All Available Log Sources |
CCF: Suspected Wireless Attack Summary | This report provides summary information on suspected wireless attacks at the internal boundary including the type if attack and impacted (targeted) host and application (if applicable). To supplement this Summary Report consider running an Investigation to capture further information. This is based on Critical and Production environments (can be defined with entity structure). | 2056 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: Time Sync Error Summary | This report provides a summary of time sync errors occurring within critical and production environments (can be defined with entity structure). | 2057 | N/A | Platform Manager | Yes | All Available Log Sources |
CCF: Top Suspicious Users | This report lists all users generating suspicious activity ordered by the number of events detected highest to lowest. | 2059 | N/A | Data Processor(s) | No | All Available Log Sources |
CCF: Use Of Non-Encrypted Protocols Summary | This report lists any use of non-encrypted protocols. | 2060 | N/A | LogMart | Yes | All Available Log Sources |
CCF: User Misuse Summary | This report summarizes detected misuse by user. | 2061 | N/A | Platform Manager | Yes | All Available Log Sources |
Detail Reports
The Intelligent Indexing settings are recommendations. The default configuration is No.
Report Name | Report Description | Report ID | Directly Meet Requirements | Data Source | Intelligent Indexing | Log Sources |
---|---|---|---|---|---|---|
CCF: Host Access Granted And Revoked Detail | This report details all access granted and revoked for production systems. | 2065 | N/A | Data Processor(s) | Yes | All Available Log Sources |
CCF: Unknown User Account Detail | This report provides detail of activity from unknown user accounts, based off CCF user lists. | 2071 | N/A | Data Processor(s) | Yes | All Available Log Sources |
Reporting Packages
Report Package Name | Report Package Description | Report Package ID |
---|---|---|
CCF: Executive Reporting Package | This reporting package is a template to deliver pertinent content for Executives on a monthly basis. | 87 |
CCF: Weekly Audit Reporting Package | This Reporting Package is a template to deliver pertinent content for Internal and/or External Audit groups on a weekly basis. | 88 |
CCF: Daily IT Operations Reporting Package | This Reporting Package is a template to deliver pertinent content for IT Operations on a daily basis. | 89 |
CCF: Daily IT Security Reporting Package | This Reporting Package is a template to deliver pertinent content for IT Security on a daily basis. | 90 |