Skip to main content
Skip table of contents

NCA OTCC – Reports and Reporting Packages

Summary Reports 

Report Name

Report Description

Report ID

Subdomain Control Support

Intelligent IndexingClassificationData SourceLog Sources
CCF: Access Failure SummaryThis report provides summary information around account access failures across all logged environments.2089

1.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2

NoAudit

Platform Manager

All Available Log Sources

CCF: Access Success SummaryThis report provides summary information around account access successes across all logged environments.20911.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Account Deleted SummaryThis report provides detailed information when an account has access revoked (deleted) across to any logged environments. This should align with the organization's policies regarding deleted accounts.20861.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Account Disabled SummaryThis report provides detailed information when an account has access revoked (disabled) across any logged environments. This should align with the organization's policies regarding disabled accounts.20841.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditLogMartAll Available Log Sources
CCF: Account Enabled SummaryThis report provides detailed information when an account as access granted (enabled) across to any logged environments. This should align with the organization's policies regarding enabled accounts.20851.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2YesAuditPlatform ManagerAll Available Log Sources
CCF: Account Modification SummaryThis report provides summary information around account modifications across all logged environments.20921.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Applications Accessed By User SummaryThis report provides information about user accessed applications.20631.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoOperationsData Processor(s)All Available Log Sources
CCF: Audit Log SummaryThis report provides a summary of audit log clearing or write failures by Impacted Host.20761.3.1, 1.4.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.2, 2.6.1, 2.6.2, 2.7.1, 2.7.2, 2.8.1, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 2.13.2, 3.1.1, 3.1.2, 4.1.2YesAuditPlatform ManagerAll Available Log Sources
CCF: Auth Failure SummaryThis report provides summary information around account authentication failures across all logged environments.20881.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2 ,4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Auth Success SummaryThis report provides summary information around account authentication successes across all logged environments.20901.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Backup Activity SummaryThis report provides a summary of activity from backup events.20621.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.8.1, 2.8.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2NoOperationsData Processor(s)All Available Log Sources
CCF: Compromises Detected SummaryThis report provides a summary of detected compromises of security by Entity and Impacted Host.20641.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityLogMartAll Available Log Sources
CCF: Config/Policy Change SummaryThis report provides a summary of the occurrence of configuration or policy changes across critical and production environments (entity structure).20491.3.1, 1.3.1, 1.4.1, 1.4.2, 1.5.1,1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.1, 2.5.2, 2.6.2, 2.7.1, 2.7.2, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.11.2, 2.12.1, 3.1.2, 4.1.2, 4.1.2YesAuditLogMartAll Available Log Sources
CCF: Critical Environment Error SummaryThis report provides summary details around critical or error messages received from critical servers or systems (entity structure) to support change management procedures.20501.3.1, 1.4.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.5.1, 2.8.1, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesOperationsPlatform ManagerAll Available Log Sources
CCF: GeoIP SummaryThis report summarizes GeoIP activity that is associated with AI Engine GeoIP rules, in the CCF compliance automation suite.20691.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1 ,2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityPlatform ManagerAll Available Log Sources
CCF: LogRhythm Data Loss Defender Log SummaryThis report provides summary information on data generated by the LogRhythm Data Loss Defender. Data is grouped by Entity, Impacted Host, Common Event, and Object with a count of how many times that condition has been experienced within the reporting period.20661.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.6.2, 2.7.1, 2.7.2, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesOperationsLogMartAll Available Log Sources
CCF: Malware Detected SummaryThis report provides a summary of malware activity by entity and impacted host within the organization's critical and production environments (entity structure).20511.3.1, 1.4.2,1 .5.1, 1.5.2, 1.5.3,1 .5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityPlatform ManagerAll Available Log Sources
CCF: Object Access SummaryThis report summarizes object access by Impacted Host.20671.3.1, 1.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.1,2 .6.1, 2.6.2, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditData Processor(s)All Available Log Sources
CCF: Patch Activity SummaryThis report provides a summary of applied patches grouped by Origin Host. It can demonstrate that all system components have the latest security patches installed.20521.3.1, 1.4.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.2, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesOperationsData Processor(s)All Available Log Sources
CCF: Physical Access SummaryThis report summarizes physical door access/authentication success and failures within the organization's physical security perimeter.20531.4.2, 1.5.1, 1.5.2, 1.5.3,1.5.4,1.6.1,1.6.2, 2.2.2, 2.3.1, 2.3.2, 2.6.1, 2.6.1, 2.8.2, 2.9.1, 2.12.1, 2.13.2, 3.1.2, 4.1.2YesAuditPlatform ManagerAll Available Log Sources
CCF: Priv Account Management Activity SummaryThis report provides a summary of various access modifications to privileged accounts occurring within the defined environments. This report requires the CCF: Privileged Accounts (user list) be established and periodically updated.20801.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3 1.5.4 1.6.1 1.6.2 2.1.1 2.1.2 2.2.1 2.2.2 2.3.1 2.3.2 2.5.1 2.6.1 2.6.2 2.9.1 2.11.1 2.11.2 2.12.1 3.1.2 4.1.2YesAuditData Processor(s)All Available Log Sources
CCF: Priv Authentication Activity SummaryThis report provides summary information around privileged account authentication success and access success activity within the defined environment. This report relies on CCF: Privileged Accounts (user list) to be established and updated periodically.20791.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2YesAuditPlatform ManagerAll Available Log Sources
CCF: Rogue Access Point SummaryThis report provides a summary of all detected rogue wireless access points by Impacted Host across critical and production environments (entity structure).20541.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityPlatform ManagerAll Available Log Sources
CCF: Signature Activity SummaryThis report provides summary information on signature update activity across critical and production environments (entity structure).20551.3.1, 1.4.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.2, 2.6.2, 2.9.1, 2.11.1, 2.11.2 2.12.1, 3.1.1, 3.1.2, 4.1.2YesOperationsLogMartAll Available Log Sources
CCF: Social Media SummarySummarizes the top URLs related to Social Media activity.20701.3.1, 1.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.2, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2NoAuditPlatform ManagerAll Available Log Sources
CCF: Suspected Wireless Attack SummaryThis report provides summary information on suspected wireless attacks at the internal boundary including the type if attack and impacted (targeted) host and application (if applicable). To supplement this Summary Report consider running an Investigation to capture further information. This is based on Critical and Production environments (can be defined with entity structure).20561.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityPlatform ManagerAll Available Log Sources
CCF: Term Account Activity SummaryThis report provides a summary of authentication successes and failures from terminated accounts (list) within any logged environments. This should align with the organization's termination policy.20871.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2YesAuditData Processor(s)All Available Log Sources
CCF: Time Sync Error SummaryThis report provides a summary of time sync errors occurring within critical and production environments (can be defined with entity structure).20571.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.5.1, 2.8.1, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesOperationsPlatform ManagerAll Available Log Sources
CCF: Use Of Non-Encrypted Protocols SummaryThis report lists any use of non-encrypted protocols.20601.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.7.1, 2.7.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesAuditLogMartAll Available Log Sources
CCF: User Misuse SummaryThis report summarizes detected misuse by user.20611.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2NoSecurityPlatform ManagerAll Available Log Sources
CCF: User Object Access SummaryThis report summarizes successful object access activity by user.20681.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.8.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2NoAuditData Processor(s)All Available Log Sources
CCF: User Priv Escalation (SU & SUDO) SummaryThis report provides summary information specific to a user privilege level status on a Linux environment. This report is specific to Linux based on a search for the MPE rule of SU Session Opened (flat file, SUDO log, or syslog).19461.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2

No

Audit

Data Processor(s)All Available Log Sources
CCF: User Priv Escalation (Windows) SummaryThis report provides summary information around changes in privilege level status of a user on a critical server or workstation, specific to Windows based on event ID, security metadata field of 2. This type of log is generated when a new process is created on a Windows machine and the token type is recorded in the object metadata field. Audit privilege use and audit process tracking must be enabled on the Windows machine being audited.20771.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.2, 4.1.2YesAuditData Processor(s)All Available Log Sources
CCF: Vulnerability Detected SummaryThis report provides a summary of potential vulnerabilities detected across the critical and production environments (can be defined with entity structure).20581.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1 2.6.2, 2.9.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesSecurityPlatform ManagerAll Available Log Sources

Detail Reports

Report Name

Report DescriptionReport IDSubdomain ControlIntelligent IndexingClassificationData SourceLog Sources
CCF: Host Access Granted And Revoked DetailThis report details all access granted and revoked for production systems.20651.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesAuditData Processor(s)All Available Log Sources
CCF: Unknown User Account DetailThis report provides detail of activity from unknown user accounts, based off CCF user lists.
2071
1.3.1, 1.4.2, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.6.1, 1.6.2, 2.1.1, 2.1.2, 2.2.1, 2.2.2, 2.3.1, 2.3.2, 2.4.1, 2.5.1, 2.6.1, 2.6.2, 2.9.1, 2.11.1, 2.11.2, 2.12.1, 3.1.1, 3.1.2, 4.1.2YesAuditData Processor(s)All Available Log Sources

Reporting Packages

Reporting Package

Description

CCF: Weekly IT Operations AIE Report Package

These are reports IT Operations should run and review on a weekly basis.

CCF: Daily IT Operations Report Package

These are reports IT Operations should run and review on a daily basis.

CCF: Daily IT Security Report Package

These are reports Security Operations should run and review on a daily basis.

CCF: Weekly Audit Report Package

These are reports Audit should run and review on a weekly basis.

CCF: Monthly Executive Report Package

These are reports Executive Management should run and review on a monthly basis.

CCF: Weekly IT Security AIE Report Package

These are reports Security Management should run and review on a weekly basis.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.