Skip to main content
Skip table of contents

GPG-13 – Lists

List Name

ID

List Type

Description

GPG-13: All Log Sources

-2321

Log Sources

This list should contain all log sources for the Entity concerned.

GPG-13: APP and DB Admin List

-2318

User

This list includes standard accounts or groups typically with administrative-based access for production environments.

GPG-13: Application and Database Production Servers

-2320

Log Sources

This list includes all in-scope, production application and database level servers within the boundary.

GPG-13: Approved Wireless Access Points

-2312

Log Sources

This list includes all approved wireless access points at the boundary.

GPG-13: Authorized VPN Users

-2316

Users

This list should be updated with any approved VPN users.

GPG-13: Critical Servers

-2341

Log Sources

This list should only be populated with those servers classified as Critical.

GPG-13: Critical Workstations

-2304

Log Sources

This list should only be populated with workstations classified as Critical

GPG-13: File Integrity Monitoring

-2298

Log Source

This list includes all production systems that generate file integrity monitoring logs including LogRhythm File Integrity Monitor.

GPG-13: Host Anti-Malware

-2299

Log Source

This list includes all host-based Anti-Malware within the internal boundary (workstations and servers).

GPG-13: Internal Boundary Enforcing Devices

-1034

Log Source

This list should contain Enforcing Devices that are on the internal boundary of a network (for example, IPS)

GPG-13: Internal Monitoring Devices

-2319

Log Source

This list should contain all internal Monitoring Devices (for example, IDS) inspecting traffic within an Impact Level rather than traffic traversing a security Boundary.

GPG-13: Internal Network Devices

-2300

Log Source

This list includes Internal network infrastructure devices. other than those devices which can be more accurately described by the lists 'Internal Monitoring Devices' and 'Internal Boundary Enforcing Devices'

GPG-13: Network Connection Consoles

-2301

Log Source

This list includes all consoles to which a network connection can be established.

GPG-13: Remote Access Devices

-2310

Log Source

This list should be updated with any log sources which could include logs from remote access activity.

GPG-13: Security Boundary Anti- Malware Gateways

-2315

Log Source

This list includes Anti-Malware gateway devices inspecting traffic traversing a Security Boundary.

GPG-13: Security Boundary Content Gateways

-2303

Log Source

This list includes content checking gateway devices (other than 'Security boundary Anti-Malware Gateways') inspecting traffic traversing a Security Boundary.

GPG-13: Security Boundary Enforcing Devices

-2307

Log Source

This list includes devices (for example, IPS, Firewalls) enforcing separation across a security boundary.

GPG-13: Security Boundary Monitoring Devices

-2311

Log Source

This list includes monitoring devices (for example, IDS) inspecting traffic traversing a security boundary.

GPG-13: Servers and Workstations

-2314

Log Source

This list should contain all servers and workstations within the environment classified as both critical and non-critical.

GPG-13: UDLA – LREnhancedAudit

-2356

Log Source

This list is configured to encompass UDLA LogRhythm AIE Rule changes.

GPG-13: VPN Devices

-2322

Log Source

This list should be updated to contain all VPN or related devices/clients.

GPG-13: Wireless IDS

-2317

Log Source

This list includes all Wireless Intrusion Detection Systems/Services (WIDS) within the boundary.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.