Skip to main content
Skip table of contents

NERC – Reports

Report Name

Description

ID

Directly Meet RequirementsAugmented RequirementsData SourceIntelligent IndexingClassificationsLog Sources

NERC-CIP: Access Failure Summary

This report provides a summary of access failures by origin login within the organization infrastructure.

1303

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4, 005-5 R1

Log Manager

Yes

Audit : Access Failure

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Account Management Activity

This report summarizes account management activity (account created, account deleted, and account modified) by account within the organization's BES Cyber Systems.

1296

007-5 R4, 007-5 R5, 004-5 R5

07-5 R4, 004-5 R4, 004-5 R5, 005-5 R1

Log Mart

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Alarm and Response Summary

This report provides a summary of all LogRhythm alarm and response activity by Entity, by day.

1342

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4

Event Manager

N/A

N/A

NERC-CIP: All Log Sources

NERC-CIP: Attack Detected Summary

This report provides a summary of detected attacks by Entity and Impacted Host.

1338

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Event Manager

Yes

Event Management

All Available Log Sources

NERC-CIP: Authentication Failure Summary

This report provides a summary of all authentication failures regardless of account type and across all log sources.

1302

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4, 005-5 R1

Log Mart

Yes

Audit : Authentication Failure

NERC-CIP: BES Cyber Systems

NERC-CIP: Backup Critical/Error Status Summary

This report provides a summary of critical failures and errors from backup software by Impacted Host. This is based on the configured AIE rule.

1345

N/A

011-1 R1, 009-5 R1

Event Manager

Yes

Operations : Critical

All Available Log Sources

NERC-CIP: Backup Ops Status Summary

This report provides a summary of all backup software operations by impacted host across the environment.

1346

N/A

011-1 R1, 009-5 R1

Log Mart

No

Operations : Information

NERC-CIP: All Log Sources

NERC-CIP: Change in Software Config (Linux)

This report provides summary information around any change in the software configuration status specific to a Linux environment. Customization is required to establish a modified audited base rule which parses a unique key value specified in an auditd.conf file. Auditd.conf must be configured to apply this unique value to certain types of audit logs (in this case execution attempts of standard

package managers, yum, rpm etc.).

1350

N/A

010-1 R1, 010-1 R2, 010-1 R3

Log Manager

Yes

Operations : Configuration

NERC-CIP: BES Cyber Systems

NERC-CIP: Change in Software Config (Windows)

This report provides summary information around any changes in software configuration status specific to a Windows environment. This report looks for logs of Windows software installed and uninstalled common events against Windows- only log source types.

1349

N/A

010-1 R1, 010-1 R2, 010-1 R3

Log Manager

Yes

Operations : Configuration

NERC-CIP: BES Cyber Systems

NERC-CIP: Compromise Detected Summary

This report provides a summary of compromise activity by Impacted Host and is based on the configured AIE rule.

1341

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4

Event Manager

Yes

Security : Compromise

All Available Log Sources

NERC-CIP: Concur VPN Auths Same User

This report provides summary information around concurrent VPN authentications from the same user account based on the configured AIE rules.

1328

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

Yes

Security : Suspicious

All Available Log Sources

NERC-CIP: Config/Policy Change Summary

This report provides summary information around any configuration or policy change that occurs throughout the environment. This is based on the configured AIE rule.

1347

N/A

010-1 R1, 010-1 R2, 010-1 R3

Event Manager

Yes

Audit : Configuration Audit : Policy

All Available Log Sources

NERC-CIP: Data Loss Defender Summary

This report provides summary information on data generated by the LogRhythm Data Loss Defender. Data is grouped by Entity, Impacted Host, Common Event, and Object with a count of how many times that condition has been experienced within the reporting period. This is based on the configured AIE rules.

1340

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 011-1 R1, 009-5 R1

Event Manager

Yes

Audit : Configuration Security : Compromise

All Available Log Sources

NERC-CIP: Default Act Auth/Accs Failure Summary

This report provides a summary of authentication or access failure activity within the environment for defined default accounts (list) and according to established AIE rules.

1318

007-5 R4, 007-5 R5, 007 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

Audit : Access Failure

All Available Log Sources

NERC-CIP: Default Act Auth/Accs Success Summary

This report provides a summary of authentication or access success activity within the environment for defined default accounts (list).

1319

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Log Mart

No

Audit : Authentication Success

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Default Act Management Summary

This report provides a summary of user access management activity within the environment for defined default accounts (list).

1320

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: ESP Network Allowed Egress Summary

This report provides a summary of allowed protocol communication by impacted host which is outbound to the electronic security perimeter.

1325

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

No

Operations : Network Allow

All Available Log Sources

NERC-CIP: ESP Network Allowed Ingress Summary

This report provides a summary of allowed protocol communication by impacted host which is outbound to the electronic security perimeter.

1326

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

No

Operations : Network Allow

All Available Log Sources

NERC-CIP: ESP Network Denied Egress Summary

This report provides a summary of denied protocol communication by impacted host which is outbound to the electronic security perimeter.

1323

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

No

Operations : Network Deny

All Available Log Sources

NERC-CIP: ESP Network Denied Ingress Summary

This report provides a summary of denied protocol communication by impacted host which is inbound to the electronic security perimeter.

1324

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

No

Operations : Network Deny

All Available Log Sources

NERC-CIP: Failed File Access (Linux)

This report provides summary information for any access attempt failure within a Linux-based file system. Customized auditing within Linux should be established to log these events.

1298

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4, 005-5 R1

Event Manager

N/A

Audit : Access Failure

NERC-CIP: BES Cyber Systems

NERC-CIP: Failed File Access (Windows)

This report provides summary information for any access attempt failure within a

Windows-based file system. Customized auditing within Windows should be established to log these events.

1299

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4, 005-5 R1

Event Manager

N/A

Audit : Access Failure

NERC-CIP: BES Cyber Systems

NERC-CIP: Files Deleted by Admin

This report provides a summary of mass file deletions executed by an Admin account. This is based on the configured AIE rule.

1360

N/A

011-1 R1

Event Manager

Yes

Security : Suspicious

All Available Log Sources

NERC-CIP: Group/Role Created Summary

This report provides a summary of group/role created by group within the organization infrastructure.

1357

N/A

011-1 R1

Log Mart

Yes

Audit : Account Created

NERC-CIP: All Log Sources

NERC-CIP: Group/Role Deleted Summary

This report provides a summary of group/role deleted by group within the organization infrastructure.

1358

N/A

011-1 R1

Log Mart

Yes

Audit : Account Deleted

NERC-CIP: All Log Sources

NERC-CIP: Group/Role Modified Summary

This report provides a summary of group/role name/attribute modified by group within the organization infrastructure.

1359

N/A

011-1 R1

Log Mart

Yes

Audit : Account Modified

NERC-CIP: All Log Sources

NERC-CIP: Host

Authentication Success Summary

This report provides summary information for any authentication success across the environment.

1300

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4, 005-5 R1

Log Mart

No

Audit : Authentication Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Int Acct Created, Used, Deleted

This report provides summary information for any instance where an internal account is created, used and then deleted. This is driven by configured AIE rule(s).

1339

005-5 R1, 007-5

R4, 007-5 R5

007-5 R3, 008-5 R1, 008-5 R3, 008-5 R3, 007-5 R4, 04-5 R4

Event Manager

Yes

Security : Suspicious

All Available Log Sources

NERC-CIP: Malware Detected Summary

This report provides summary information when malware is detected in the environment and is based on the configured AIE rule.

1337

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Event Manager

Yes

Security : Malware

All Available Log Sources

NERC-CIP: Non-encrypted protocol

This report provides a summary of non-encrypted protocols seen on the network grouped by Impacted Application.

1321

N/A

005-5 R1, 005-5 R2, 011-1 R1

Log Manager

Yes

Audit

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Object Creation/Disposal Summary

This report provides a summary of object creations, deletions, and removals within the BES Cyber Systems.

1354

N/A

011-1 R1

Log Manager

No

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Password Modified Summary

This report provides a summary of passwords modified by account within the organization infrastructure.

1344

N/A

004-5 R5, 007 R5

Event Manager

No

Audit : Account Modified

NERC-CIP: All Log Sources

NERC-CIP: Patches or Signatures Updated Summary

This report provides a summary of applied patches grouped by Origin Host. It can demonstrate that all system components have the latest security patches installed.

1329

007-5 R4

007-5 R3, 007-5 R4, 007-5 R2, 010-1 R1, 010-1 R2, 010-1 R3

Log Manager

No

Audit : Configuration

NERC-CIP: All Log Sources

NERC-CIP: Physical Access Summary

This report summarizes physical door access success, failures and suspicious door activity within the organization's physical security perimeter.

1295

007-5 R4, 007-5 R5, 004-5 R5, 006-5 R1

007-5 R4, 004-5 R4, 004-5 R5, 006-5 R2

Event Manager

No

Audit : Access Success

Audit : Authentication Success

Audit : Access Failure

Audit : Authentication Failure

NERC-CIP: Physical Security Perimeter

NERC-CIP: Port Misuse Summary

This report provides a summary of network traffic that connects over non- standard ports. This is based on configured AIE rules.

1361

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 005-5 R1, 005-5 R2

Event Manager

Yes

Security : Suspicious

All Available Log Sources

NERC-CIP: Priv Act Auth/Accs Failure Summary

This report provides a summary of authentication or access failure activity within the environment for defined privileged accounts (list) and according to established AIE rules.

1309

007-5 R4, 007-5 R5, 007 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

Audit : Access Failure

All Available Log Sources

NERC-CIP: Priv Act Auth/Accs Success Summary

This report provides a summary of authentication or access success activity within the environment for defined privileged accounts (list).

1310

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Log Mart

Yes

Audit : Authentication Success

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Priv Act Management Summary

This report provides a summary of user access management activity within the environment for defined privileged accounts (list).

1311

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Priv Group Access Granted Summary

This report summarizes access granted to privileged groups (administrators, dnsadmins, domain admins, enterprise admins, schema admins) by Group. This is based on a configured AIE Rule.

1297

007-5 R4, 007-5 R5

007- R4, 004-5 R4, 011-1 R1

Event Manager

Yes

Audit : Access Granted

All Available Log Sources

NERC-CIP: Rogue WAP Detected Summary

This report provides a summary of detected rogue access points across the environment.

1327

005-5 R1

005-5 R1, 005-5 R2

Event Manager

Yes

Security : Suspicious

All Available Log Sources

NERC-CIP: Security Events Exec Summary

This report summarizes detected security relevant events by Entity and Impacted Host.

1336

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Mart

N/A

Security

NERC-CIP: All Log Sources

NERC-CIP: Security Failure Exec Summary

This report provides a summary of security failure events (failed activity, failed attack, failed compromise, failed denial of service, failed malware, failed misuse, and failed suspicious) by Entity.

1335

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Manager

N/A

Security

NERC-CIP: All Log Sources

NERC-CIP: Shared Act Auth/Accs Failure Summary

This report provides a summary of authentication or access failure activity within the environment for defined shared accounts (list) and according to established AIE rules.

1312

007-5 R4, 007-5

R5, 007 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

Audit : Access Failure

All Available Log Sources

NERC-CIP: Shared Act Auth/Accs Success Summary

This report provides a summary of authentication or access success activity within the environment for defined shared accounts (list).

1313

007-5 R4, 007-5 R5

004-5 R4, 007-5 R4

Log Mart

No

Audit : Authentication Success

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Shared Act Management Summary

This report provides a summary of user access management activity within the environment for defined shared accounts (list).

1314

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Log Mart

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Software Installation Summary

This report provides summary information around any software installation activity across the environment and is based on the configured AIE rule.

1348

N/A

010-1 R1, 010-1 R2, 010-1 R3

Event Manager

Yes

Audit : Configuration

All Available Log Sources

NERC-CIP: Software Status Change After Attack

This report provides summary information relating to any software installs or uninstalls, after an attack or vulnerability is identified by a vulnerability scanning system.

1351

N/A

010-1 R1, 010-1 R2, 010-1 R3

Event Manager

Yes

Security : Attack

All Available Log Sources

NERC-CIP: Status Change of Dvc Connected to Host

This report provides summary information around any device attached to a host, and uses a custom base rule to look for kernel syslog messages that indicate a USB device attachment.

1343

007-5 R4, 005-5 R1

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 010-1 R1, 010-1 R2, 010-1 R3, 011-1 R1

Event Manager

Yes

Operations : Other Operations

NERC-CIP: All Log Sources

NERC-CIP: Suspicious Activity Summary

This report provides a summary of suspicious activity by entity and impacted host within the organization infrastructure.

1301

005-5 R1, 007-5

R4, 007-5 R5

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 004-5 R4

Log Mart

Yes

Security : Suspicious

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: System Critical/Error Status

Summary

This report summarizes critical and error conditions for production servers and network infrastructure devices (all log sources).

1322

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-4 R4, 005-5 R1, 005-5 R2

Log Mart

Yes

Operations : Critical Operations : Error

NERC-CIP: All Log Sources

NERC-CIP: System File Permission Change (Linux)

This report provides summary information for any permission changes within a Linux-based file system. Customized auditing within Linux should be established to log these events.

1355

N/A

011-1 R1

Log Manager

No

Audit : Access Granted

NERC-CIP: All Log Sources

NERC-CIP: System File Permission Change

(Windows)

This report provides summary information for any permission changes within a Windows-based file system. Customized auditing within Windows should be

established to log these events.

1356

N/A

011-1 R1

Log Manager

No

Audit : Access Granted

NERC-CIP: All Log Sources

NERC-CIP: System Time Change After Attack

This report provides summary information for any instance where a system time change takes place on a host after a compromise on that same host.

1352

N/A

010-1 R1, 010-1 R2, 010-1 R3

Event Manager

Yes

Security : Attack

All Available Log Sources

NERC-CIP: Term Act Auth/Accs Failure Summary

This report provides a summary of authentication or access failure activity within the environment for defined terminated accounts (list) and according to established AIE rules.

1315

007-5 R4, 007-5 R5, 007 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

Audit : Access Failure

All Available Log Sources

NERC-CIP: Term Act Auth/Accs Success Summary

This report provides a summary of authentication or access success activity within the environment for defined terminated accounts (list).

1316

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Log Mart

Yes

Audit : Authentication Success

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Term Act Management Summary

This report provides a summary of user access management activity within the environment for defined terminated accounts (list).

1317

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Top Attacker Summary

This report lists all attackers ordered by the number of events detected highest to lowest.

1334

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Mart

N/A

Security : Attack

NERC-CIP: All Log Sources

NERC-CIP: Top Suspicious Login Summary

This report summarizes security activity (activity, attack, compromise, denial of service, failed activity, failed attack, failed denial of service, failed malware, failed misuse, failed suspicious, malware, misuse, reconnaissance, suspicious, vulnerability) by Origin Login.

1333

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Manager

N/A

Security : Suspicious

NERC-CIP: All Log

Sources

NERC-CIP: Top Targeted Application Summary

This report summarizes security activity (activity, attack, compromise, denial of service, failed activity, failed attack, failed denial of service, failed malware, failed misuse, failed suspicious, malware, misuse, reconnaissance, suspicious,

vulnerability) by impacted application within the organization infrastructure.

1332

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Manager

N/A

Security

NERC-CIP: All Log Sources

NERC-CIP: Top Targeted Assets Summary

This report summarizes security activity (activity, attack, compromise, denial of service, failed activity, failed attack, failed denial of service, failed malware, failed misuse, failed suspicious, malware, misuse, reconnaissance, suspicious, vulnerability) by impacted host within the organization infrastructure.

1331

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 0085 R2, 008-5 R3, 007-5 R4

Log Manager

N/A

Security

NERC-CIP: All Log

Sources

NERC-CIP: Vendor Act Auth/Accs Failure Summary

This report provides a summary of vendor account authentication/access failure activity (failed/object/access/add/close/create/delete/download/execute/initialize/modify

/move/read/rename/remove and login failure) by Origin Login. This is based on configuration of an AIE rule.

1306

007-5 R4, 007-5 R5, 007 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

Audit : Access Failure

All Available Log Sources

NERC-CIP: Vendor Act Auth/Accs Success Summary

This report provides a summary of authentication or access success activity within the environment for defined Vendor accounts (list).

1307

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Log Mart

No

Audit : Authentication Success

Audit : Access Success

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Vendor Act Management Summary

This report provides summary information of vendor account management activity (account deleted and account modified) by account.

1308

007-5 R4, 007-5 R5

007-5 R4, 004-5 R4

Event Manager

Yes

Audit: Account Created

Audit: Account Deleted

Audit: Account Modified

NERC-CIP: BES Cyber Systems

NERC-CIP: Electronic Security Perimeter

NERC-CIP: VPN Node

Registration Failure (Auth)

This report provides summary information on unsuccessful node registration resulting in a failed VPN connection attempt into the boundary. This is analyzed

against an authorized VPN user list to distinguish un-authorized vs. authorized VPN authentication failures.

1304

N/A

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

NERC-CIP: Electronic Security Perimeter

NERC-CIP: VPN Node

Registration Failure (un- Auth)

This report provides summary information on unsuccessful node registration resulting in a failed VPN connection attempt into the boundary. This is analyzed against an authorized VPN user list to distinguish un-authorized vs. authorized VPN authentication failures.

1305

N/A

007-5 R4, 004-5 R4

Event Manager

Yes

Audit : Authentication Failure

NERC-CIP: Electronic Security Perimeter

NERC-CIP: Vulnerability Detected Summary

This report provides a summary of potential vulnerabilities detected across the environment and is based on the configured AIE rule.

1330

005-5 R1, 007-5 R4

007-5 R3, 008-5 R1, 008-5 R2, 008-5 R3, 007-5 R4, 010-1 R3

Event Manager

Yes

Security : Vulnerability

All Available Log Sources

NERC-CIP: Windows Firewall Change Summary

This report provides summary information around Windows firewall changes that occur after an attack has happened. This is configured to report on enabled AIE rules.

1353

N/A

010-1 R1, 010-1 R2, 010-1 R3

Event Manager

No

Audit : Configuration

All Available Log Sources

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.