Skip to main content
Skip table of contents

GPG-13 – AI Engine Rules

Name

Description

Rule ID

ClassificationCorresponding InvestigationDirect/Augment Control ActivityAlarmingLog Source Lists

GPG-13: Attck Recog Software Policy Change

This AIE Rule creates an event and alerts on any change to boundary attack recognition software policies (signature) to supplement testing of GPG-13 control PMC3.9. The AIE Rule is not a direct requirement, but can be enabled for a more proactive approach to change management. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

665

Audit : Configuration

N/A

PMC3.9 – Direct

Yes

GPG-13: Security Boundary Monitoring Devices

GPG-13: Malware Detected on Host

This AIE Rule creates an event and alerts for any malware detection on any host (server or workstation) that exists within the boundary in direct support of GPG-13 control PMC4.2 [Alert A].

667

Security : Malware

GPG-13: Malware Detected on Host (Server or Workstation)

PMC4.2 [A] – Direct

Yes

GPG-13: Servers and Workstations

GPG-13: Auth Failure on Intrnl Boundary Dvc

This AIE Rule creates an event and alerts on authentication failures on any internal boundary monitoring device to supplement testing of GPG-13 control PMC5.3 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

670

Audit : Authentication Failure

N/A

PMC5.3 [B] - Direct

Yes

GPG-13: Internal Boundary Enforcing Devices

GPG-13: Internal Monitoring Devices

GPG-13: Internal Network Devices

GPG-13: Auto Response from Intrnl Bndry Dvc

This AIE rule creates an event and alerts on automated responses from internal firewalls to supplement testing of GPG-13 control PMC5.14. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

673

Operations: Network Deny

N/A

PMC5.14 [D] - Augment

Yes

GPG-13: Internal Boundary Enforcing Devices

GPG-13: Backup Ops Critical Error Failure

This AIE Rule creates an event and alerts on various backup operation failures or errors that could impact the preservation and recovery of files or database elements on critical servers or workstations (list). This rule supplements testing of GPG-13 control PMC8.2 [Alert A] by alerting and providing information around the backup operation failure based on a common event search against critical server or workstation logs (list). This AIE Rule is based on Data Segregation according to Log Source Root Entity.

681

Operations : Critical

N/A

PMC8.2 [A] – Direct

Yes

GPG-13: All Log Sources

GPG-13: Bndry Mon Dvce Config/Policy Chg

This AIE Rule creates an event and alerts on any change to boundary monitoring device configurations or policies to supplement testing of GPG-13 control PMC3.7. This is not a direct requirement, but can be enabled for a more proactive approach to apply change management to monitoring devices. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

664

Audit : Configuration

N/A

PMC3.7 [B] – Direct

Yes

GPG-13: Security Boundary Content Gateways

GPG-13: Security Boundary Enforcing Devices

GPG-13: Boundary Monitoring Device Critical

This AIE Rule creates an event and alerts on any message from a boundary monitoring device at critical status and above to supplement testing of GPG-13 control PMC3.2 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

661

Operations : Critical

N/A

PMC3.2 [B] – Direct

Yes

GPG-13: Security Boundary Anti-Malware Gateways

GPG-13: Security Boundary Content Gateways

GPG-13: Security Boundary Enforcing Devices

GPG-13: Security Boundary Monitoring Devices

GPG-13: Intrnl Bndry Monitoring Dvc Chg

This AIE Rule creates an event and alerts on any change to internal boundary monitoring device configurations or policies to supplement testing of GPG-13 control PMC5.6 [Alert A]. The AIE rule is not a direct requirement, but can be enabled to enhance and supplement the capabilities of the Summary Report to meet control objectives. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

671

Audit: Configuration

GPG-13: Internal Boundary Monitoring Device Change

PMC5.6 - Direct

Yes

GPG-13: Internal Boundary Enforcing Devices

GPG-13: Intrnl Monitor Dvc Critical

This AIE Rule creates an event and alerts on any message from a boundary monitoring device at critical status and above to supplement testing of GPG-13 control PMC5.2 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

669

Operations : Critical

N/A

PMC5.2 [B] – Direct

Yes

GPG-13 Internal Boundary Enforcing Devices

GPG-13: Internal Monitoring Devices

GPG-13: Network Connection Console Critical

This AIE Rule creates an event and alerts on any message from a network connection console at the boundary to supplement testing of GPG-13 control PMC6.7 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

676

Operations : Critical

N/A

PMC6.7 [B] – Direct

Yes

GPG-13: Network Connection Consoles

GPG-13: VPN Node Registration Failure

This AIE Rule creates an event and alerts on any unsuccessful Virtual Private Network (VPN) node registration attempt into the boundary to supplement testing of GPG-13 control PMC6.2 [Alert A]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

675

Audit : Authentication Failure

N/A

PMC6.2 [A] – Direct

Yes

GPG-13: GPG-13: VPN Devices

GPG-13: Attack Detected at Boundary

This AIE Rule creates an event and alerts on suspected attacks (success/failure) against all boundary monitoring devices to supplement testing of GPG-13 control PMC3.4 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

663

Security : Attack

GPG-13: Attack Detected at Boundary

PMC3.4 [B] - Direct

Yes

GPG-13: Security Boundary Enforcing Devices

GPG-13: Security Boundary Monitoring Devices

GPG-13: Auth Failure on Boundary Device

This AIE Rule creates an event and alerts on authentication failures on any boundary monitoring device to supplement testing of GPG-13 control PMC3.3 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

662

Audit : Authentication Failure

GPG-13: Auth Failure on Boundary Device

PMC3.3 [B] – Direct

Yes

GPG-13: Security Boundary Anti-Malware Gateways

GPG-13: Security Boundary Content Gateways

GPG-13: Security Boundary Enforcing Devices

GPG-13: Security Boundary Monitoring Devices

GPG-13: Blocked File Import/Export Attempt

This AIE Rule creates an event and alerts for any blocked attempts to import or export files across the boundary to supplement testing of GPG-13 control PMC2.4 [Alert B], 2.5 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

620

Operations: Network Deny

GPG-13: Failed File Import/Export Attempt

PMC2.4 [B] & 2.5 [B]

– Direct

Yes

GPG-13: Security Boundary Anti-Malware Gateways

GPG-13: Security Boundary Content Gateways

GPG-13: Security Boundary Enforcing Devices

GPG-13: Security Boundary Monitoring Devices

GPG-13: Blocked Web Browsing Activity

This AIE Rule creates an event and alerts for any denied web browsing activity within the boundary to supplement testing of GPG-13 control PMC2.3 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

619

Operations: Network Deny

N/A

PMC2.3 [B] - Direct

Yes

GPG-13: Security Boundary Content Gateways

GPG-13: Boundary Anti- Malware Policy Change

This AIE Rule creates an event and alerts based on anticipated policy change logs from Anti-Malware software within a 24 hour time period. The customer should define this time period according to their Anti-Malware maintenance window. This AIE Rule is not a direct requirement, but can be enabled to enhance the ability to track and respond to Anti-Malware policy changes and ensure changes are appropriate. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

618

Audit : Configuration

N/A

PMC2.2 [A] -Direct

Yes

GPG-13: Security Boundary Anti-Malware Gateways

GPG-13: Critical Host at Critical Status

This AIE Rule creates an event and alerts on any message from a critical host (defined servers and workstations) at critical status and above to supplement testing of GPG-13 control PMC4.1 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

666

Operations : Critical

N/A

PMC4.1 [B] – Direct

Yes

GPG-13: Critical Servers

GPG-13: Critical Workstations

GPG-13: File Monitoring Event - File Changes

This AIE Rule creates an event and alerts for any modifications made to a files within a file system included within the GPG-13: File Integrity Monitors. This alerting requires customization according to the prescribed application of file integrity monitoring (FIM) capabilities within a LogRhythm Agent installed on in-scope file systems. This rule supplements testing of GPG-13 control PMC4.11 [Alert C]. Appropriate system monitoring agent settings should be configured for endpoint FIM monitoring based on the environment (Windows/Linux) to capture file path information.

668

Security: Activity

N/A

PMC4.11 [C] - Direct

Yes

GPG-13: File Integrity Monitoring

GPG-13: IPS Command and Response

This AIE Rule creates an event and alerts on any command and automated response from an IPS to supplement testing of GPG-13 control PMC3.14 [Alert D]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

684

Audit: Access Failure

N/A

PMC3.14 [D] – Augment

Yes

GPG-13: Security Boundary Enforcing Devices

GPG-13: Logging Exception

This AIE rule creates an event and alerts on logging exceptions within the LogRhythm console as a result of a log reset, error condition, failure or threshold exception to supplement testing of GPG-13 control PMC10.1 [A].

683

Operations: Warning

N/A

PMC10.1 [A] - Direct

Yes

GPG-13: All Log Sources

GPG-13: Malware Detected at Boundary

This AIE Rule creates an event and alerts for any malware detection on any device that exists on the Boundary Log Source List or device supporting network monitoring in direct support of GPG-13 control PMC2.1 [Alert A]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

617

Security : Malware

GPG-13: Malware Detection Activity

PMC2.1 [A] – Direct

Yes

GPG-13: Security Boundary Anti-Malware Gateways

GPG-13: Security Boundary Content Gateways

GPG-13: Security Boundary Enforcing Devices

GPG-13: Security Boundary Monitoring Devices

GPG-13: Network Account Locked Out Status

This AIE Rule creates an event and alerts on any network account status change to locked or locked-out to supplement testing of GPG-13 control PMC7.5 [Alert B]. An exclusion rule is used to skip computer accounts that end in '$'. Further, the network account 'locked-out' activities are captured in reporting to meet control PMC7.2 [Report A] reference to this alert. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

680

Audit: Access Revoked

N/A

PMC7.5 [B] – Direct

Yes

GPG-13: Servers and Workstations

GPG-13: Network Auth Failure

This AIE Rule creates an event and alerts on any authentication failure activity against a network connection console at the boundary to supplement testing of GPG-13 control PMC6.8 [Alert B]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

677

Audit : Authentication Failure

N/A

PMC6.8 [B] – Direct

Yes

GPG-13: Network Connection Consoles

GPG-13: Rejected Connection to Network

This Rule creates an event and alerts on failed attempts to connect equipment to protected network attachment points at the boundary to supplement testing of GPG-13 control PMC6.6 [Alert B]. This Rule is specifically concerned with 802.1x port security on switches. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

685

Audit : Other Audit Failure

N/A

PMC6.6 [B] – Direct

Yes

GPG-13: Network Connection Consoles

GPG-13: Remote Access Auth Failure

This AIE Rule creates an event and alerts on any authentication failure activity originating from a remote access point to supplement testing of GPG-13 control PMC6.1 [Alert A]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

674

Audit : Authentication Failure

GPG-13: Remote Auth Failure

PCM6.1 [A] – Direct

Yes

GPG-13: Remote Access Devices

GPG-13: Suspected Internal Attack

This AIE Rule creates an event and alerts on suspected attacks (success/failure) against the internal boundary monitoring devices to supplement testing of GPG-13 control PMC5.7 [Alert C]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

672

Security : Attack

GPG-13: Suspected Internal Attack

PMC5.7 [C] – Direct

Yes

GPG-13: Internal Boundary Enforcing Devices

GPG-13: Suspected Wireless Attack

This AIE Rule creates an event and alerts on suspected wireless attacks (success/failure) against the boundary monitoring devices to supplement testing of GPG-13 control PMC6.12 [Alert D]. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

678

Security : Attack

N/A

PMC6.12 [D] – Direct

Yes

GPG-13: Wireless IDS

GPG-13: Suspicious Rogue Host Activity

This AIE Rule creates an event and alerts on all rogue wireless interfaces or access points logged based on common event and directly supports GPG-13 control PMC6.17 and indirectly supports PMC6.10. This AIE Rule is based on Data Segregation according to Log Source Root Entity.

679

Security : Suspicious

N/A

PMC6.10 – Augment

PMC6.17 [D] - Direct

Yes

GPG-13: Wireless IDS

GPG-13: Time Sync Error

This AIE Rule creates an event and alerts for any time sync errors occurring on any Log Source Entities in direct support of GPG-13 control PMC1.2 [Alert A] and in supplemental support of PMC1.1 and 1.3. This AIE Rule is based on Data Segregation according to Log Source Root Entity

616

Operations : Warning

N/A

PMC1.2 [A] – Direct

PMC1.1 & 1.3 - Augment

Yes

GPG-13: All Log Sources

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.