Skip to main content
Skip table of contents

GDPR – Reports and Reporting Packages

Summary Reports

The Intelligent Indexing settings are recommendations. The default configuration is No.

Report Name

Report Description

Report ID

Directly Meet Requirements

Data Source

Intelligent Indexing

Log Sources

CCF: Applications Accessed By User Summary

This report provides information about user accessed applications.
Augment: Article 17, Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2063

N/A

Data Processor(s)

No

All Available Log Sources

CCF: Backup Activity Summary

This report provides a summary of activity from backup events.
Augment: Article 22, Article 24, Article 25, Article 32, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2062

N/A

Data Processor(s)

No

All Available Log Sources

CCF: Compromises Detected Summary

This report provides a summary of detected compromises of security by Entity and Impacted Host.
Augment: Article 22, Article 24, Article 25, Article 32, Article 35, Article 46, Article 47, Article 90

2064

N/A

LogMart

Yes

All Available Log Sources

CCF: Config/Policy Change Summary

This report provides a summary of the occurrence of configuration or policy changes across critical and production environments (entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2049

N/A

LogMart

No

All Available Log Sources

CCF: Critical Environment Error Summary

This report provides summary details around critical or error messages received from critical servers or systems (entity structure) to support change management procedures.
Augment: Article 17, Article 18, Article 21, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2050

N/A

Platform Manager

Yes

All Available Log Sources

CCF: GeoIP Summary

This report summarizes GeoIP activity that is associated with AI Engine GeoIP rules, in the CCF compliance automation suite.
Augment: Article 17, Article 18, Article 21, Article 24, Article 25, Article 32, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2069

N/A

Platform Manager

Yes

All Available Log Sources

CCF: LogRhythm Data Loss Defender Log Summary

This report provides summary information on data generated by the LogRhythm Data Loss Defender.  Data is grouped by Entity, Impacted Host, Common Event, and Object with a count of how many times that condition has been experienced within the reporting period.
Augment: Article 17, Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2066

N/A

LogMart

Yes

All Available Log Sources

CCF: Malware Detected Summary

This report provides a summary of malware activity by entity and impacted host within the organization's critical and production environments (entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2051

N/A

Platform Manager

Yes

All Available Log Sources

CCF: Object Access Summary

This report summarizes object access by Impacted Host.
Augment: Article 17, Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2067

N/A

Data Processor(s)

No

All Available Log Sources

CCF: Patch Activity Summary

This report provides a summary of applied patches grouped by Origin Host. It can demonstrate that all system components have the latest security patches installed.
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2052

N/A

Data Processor(s)

No

All Available Log Sources

CCF: Physical Access Summary

This report summarizes physical door access/authentication success and failures within the organization's physical security perimeter.
Augment: Article 22, Article 24, Article 25, Article 32, Article 35, Article 46, Article 47, Article 90

2053

N/A

Platform Manager

No

All Available Log Sources

CCF: Rogue Access Point Summary

This report provides a summary of all detected rogue wireless access points by Impacted Host across critical and production environments (entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2054

N/A

Platform Manager

Yes

All Available Log Sources

CCF: Signature Activity Summary

This report provides summary information on signature update activity across critical and production environments (entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 35, Article 46, Article 47, Article 90

2055

N/A

LogMart

No

All Available Log Sources

CCF: Social Media Summary

Summarizes the top URLs related to Social Media activity.
Augment: Article 17, Article 18, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2070

N/A

Platform Manager

No

All Available Log Sources

CCF: Suspected Wireless Attack Summary

This report provides summary information on suspected wireless attacks at the internal boundary including the type if attack and impacted (targeted) host and application (if applicable).  To supplement this Summary Report consider running an Investigation to capture further information. This is based on Critical and Production environments (can be defined with entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2056

N/A

Platform Manager

Yes

All Available Log Sources

CCF: Time Sync Error Summary

This report provides a summary of time sync errors occurring within critical and production environments (can be defined with entity structure).
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2057

N/A

Platform Manager

Yes

All Available Log Sources

CCF: Top Suspicious Users

This report lists all users generating suspicious activity ordered by the number of events detected highest to lowest.
Augment: Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 46, Article 47, Article 90

2059

N/A

Data Processor(s)

No

All Available Log Sources

CCF: Use Of Non-Encrypted Protocols Summary

This report lists any use of non-encrypted protocols.
Augment: Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2060

N/A

LogMart

Yes

All Available Log Sources

CCF: User Misuse Summary

This report summarizes detected misuse by user.
Augment: Article 18, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2061

N/A

Platform Manager

Yes

All Available Log Sources

Detail Reports

The Intelligent Indexing settings are recommendations. The default configuration is No.

Report Name

Report Description

Report ID

Directly Meet Requirements

Data Source

Intelligent Indexing

Log Sources

CCF: Host Access Granted And Revoked Detail

This report details all access granted and revoked for production systems.
Augment: Article 17, Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2065

N/A

Data Processor(s)

Yes

All Available Log Sources

CCF: Unknown User Account Detail

This report provides detail of activity from unknown user accounts, based off CCF user lists.
Augment: Article 17, Article 18, Article 21, Article 22, Article 24, Article 25, Article 32, Article 33, Article 34, Article 35, Article 40, Article 44, Article 45, Article 46, Article 47, Article 90

2071

N/A

Data Processor(s)

Yes

All Available Log Sources

Reporting Packages

Report Package Name

Report Package Description

Report Package ID

CCF: Executive Reporting Package

This reporting package is a template to deliver pertinent content for Executives on a monthly basis.

87

CCF: Weekly Audit Reporting Package

This Reporting Package is a template to deliver pertinent content for Internal and/or External Audit groups on a weekly basis.

88

CCF: Daily IT Operations Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Operations on a daily basis.

89

CCF: Daily IT Security Reporting Package

This Reporting Package is a template to deliver pertinent content for IT Security on a daily basis.

90

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.