Up
Previous Next

Sheriff CSMâ„¢

List of Sheriff CSM Reports

Sheriff updates the Sheriff CSM reports on an on-going basis. The following table lists the reports in alphabetical order according to their category.

List of Reports
CategoryReport Title
Alarms Alarm Report
Malware Alarms
Asset Asset Compliance Report
Asset Report
Availability Report
Vulnerabilities Report
Compliance Application Exploits
Business and Compliance
DFARS Default Account Usage
DFARS Remote Access Report
DFARS Unencrypted Traffic
FERPA Default Account Usage
FERPA Remote Access Report
FERPA Unencrypted Traffic
FISMA Report
GLBA: File Adds or Deletes
GLBA: File Changes
GLBA: Firewall User Changes
GLBA: Group Changes
GLBA: MAC Address Changes
GLBA: Policy and Configuration Changes
GLBA: Registry Changes
GLBA: System Failed Logins
GLBA: System Successful Logons
GLBA: System Time Changes
GLBA: User Account Changes
GLBA: User Activity
HIPAA Report
HIPAA: Account Lockouts
HIPAA: Account Unlock Report
HIPAA: Authentication Failed Logins
HIPAA: Database Failed Logons
HIPAA: Database Successful Logons
HIPAA: Failed Logins
HIPAA: Failed Logon to Firewall
HIPAA: FTP Failed Logons
HIPAA: FTP Successful Logons
HIPAA: List of identified ePHI assets
HIPAA: List of identified ePHI assets with Services
HIPAA: Password Change Status
HIPAA: Successful Logon to Firewall
HIPAA: System Failed Logins
HIPAA: System Successful Logons
ISO 27002: Accounts Locked Out
ISO 27002: Accounts Unlocked
ISO 27002: Active Directory Group Additions
ISO 27002: Active Directory Group Removals
ISO 27002: Administrative Logon
ISO 27002: Antivirus Disabled
ISO 27002: Antivirus Events Detected
ISO 27002: Assets with Vulnerabilities
ISO 27002: Database Failed Logons
ISO 27002: Database Successful Logons
ISO 27002: Failed Logon to Firewall
ISO 27002: FTP Failed Logons
ISO 27002: FTP Successful Logons
ISO 27002: Identified Services on a Group of Systems
ISO 27002: List of Identified Assets
ISO 27002: Successful Logon to Firewall
ISO 27002: System Failed Logons
ISO 27002: System Successful Logons
NERC CIP: IPv6 Detection
NERC CIPv5: Antivirus Details
NERC CIPv5: Antivirus Disabled
NERC CIPv5: Current Vulnerabilities Report
NERC CIPv5: Database Failed Logons
NERC CIPv5: Database Successful Logons
NERC CIPv5: Failed Logon to Firewall
NERC CIPv5: File Adds or Deletes
NERC CIPv5: File Changes
NERC CIPv5: FTP Failed Logons
NERC CIPv5: FTP Successful Logons
NERC CIPv5: List of identified BES Cyber Assets
NERC CIPv5: List of identified BES Cyber Assets with Services
NERC CIPv5: MAC Address Changes
NERC CIPv5: New Software Installed
NERC CIPv5: Password Change Status
NERC CIPv5: Registry Adds or Deletes
NERC CIPv5: Registry Changes
NERC CIPv5: System Failed Logins
NERC CIPv5: System Successful Logons
NERC CIPv5: Sheriff CSM User Activity
NIST 800-171 Default Account Usage
NIST 800-171 Remote Access Report
NIST 800-171 Unencrypted Traffic
PCI 2.0 Report
PCI 3.0 Report
PCI DSS 3.2: All Antivirus Security Risk Events
PCI DSS 3.2: All Virus Events
PCI DSS 3.2: Encrypted Networks Having Unencrypted APs
PCI DSS 3.2: Access Control Device Denied
PCI DSS 3.2: Account Lockouts
PCI DSS 3.2: Account Unlock Report
PCI DSS 3.2: Admin Access to Systems
PCI DSS 3.2: Antivirus Definition Updates
PCI DSS 3.2: Antivirus Disabled
PCI DSS 3.2: Antivirus Failed Updates
PCI DSS 3.2: Authentications with Default Credentials
PCI DSS 3.2: Cloaked Wireless Networks with Uncloaked APs
PCI DSS 3.2: Database Configuration Changes
PCI DSS 3.2: Database Errors
PCI DSS 3.2: Database Failed Logins
PCI DSS 3.2: Database Successful Logins
PCI DSS 3.2: Database Users Added
PCI DSS 3.2: Database Users Removed
PCI DSS 3.2: Dropped or Denied Connections
PCI DSS 3.2: Encrypted HTTPS Connections
PCI DSS 3.2: Encrypted VPN Client Connections Accepted
PCI DSS 3.2: Encrypted VPN Client Connections Failed
PCI DSS 3.2: Environment User Activity
PCI DSS 3.2: Failed Logins
PCI DSS 3.2: Firewall Configuration Changes
PCI DSS 3.2: Firewall Failed Authentication
PCI DSS 3.2: Firewall Intrusion Detection
PCI DSS 3.2: Firewall Successful Authentication
PCI DSS 3.2: Firewall User Changes
PCI DSS 3.2: Group Changes
PCI DSS 3.2: Infected Computers
PCI DSS 3.2: Information Security Policy Compliance Checks
PCI DSS 3.2: Information Security Policy Compliance Failed
PCI DSS 3.2: Intrusion Detection Events
PCI DSS 3.2: Security Device Policy Modifications
PCI DSS 3.2: Successful Logins
PCI DSS 3.2: Suspicious Clients on Wireless Networks
PCI DSS 3.2: Suspicious Database Events
PCI DSS 3.2: System Time Changes
PCI DSS 3.2: User Management Activity
PCI DSS 3.2: Vulnerability Details
PCI DSS 3.2: Wireless Networks
PCI DSS 3.2: Wireless Networks Using Weak Encryption
PCI: File Integrity Changes
PCI: User Management Activity
SOX Report
Raw Logs Raw Logs
Raw Logs: Access
Raw Logs: Alarm
Raw Logs: Alert
Raw Logs: Anomaly Detection
Raw Logs: Antivirus
Raw Logs: Application
Raw Logs: Application Firewall
Raw Logs: Applications
Raw Logs: Authentication
Raw Logs: Authentication and DHCP
Raw Logs: Availability
Raw Logs: Data Protection
Raw Logs: Database
Raw Logs: Denial of Service
Raw Logs: Exploit
Raw Logs: Firewall
Raw Logs: Honeypot
Raw Logs: Info
Raw Logs: Infrastructure Monitoring
Raw Logs: Intrusion Detection
Raw Logs: Intrusion Prevention
Raw Logs: Inventory
Raw Logs: Mail Security
Raw Logs: Mail Server
Raw Logs: Malware
Raw Logs: Management Platform
Raw Logs: Network
Raw Logs: Network Discovery
Raw Logs: Operating System
Raw Logs: Other Devices
Raw Logs: Policy
Raw Logs: Proxy
Raw Logs: Reconnaissance
Raw Logs: Router/Switch
Raw Logs: Server
Raw Logs: Suspicious
Raw Logs: System
Raw Logs: Unified threat management
Raw Logs: Voip
Raw Logs: VPN
Raw Logs: Vulnerability Scanner
Raw Logs: Web Server
Raw Logs: Wireless
Raw Logs: Wireless Security/Management
Security Events Activity from OTX Pulses
Activity with OTX IP Reputation Information
Database Activity
Events by Data Source
Events by Product Type
Events by Source Category
Geographic Report
Security Events: Access
Security Events: Account Changes
Security Events: Admin Access
Security Events: Alarm
Security Events: Alert
Security Events: Anomaly Detection
Security Events: Antivirus
Security Events: Application
Security Events: Application Firewall
Security Events: Applications
Security Events: Authentication
Security Events: Authentication and DHCP
Security Events: Availability
Security Events: Data Protection
Security Events: Database
Security Events: Denial of Service
Security Events: Exploit
Security Events: Firewall
Security Events: Honeypot
Security Events: Impacts
Security Events: Info
Security Events: Infrastructure Monitoring
Security Events: Intrusion Detection
Security Events: Intrusion Prevention
Security Events: Inventory
Security Events: Mail Security
Security Events: Mail Server
Security Events: Malware
Security Events: Management Platform
Security Events: Network
Security Events: Network Discovery
Security Events: Operating System
Security Events: Other Devices
Security Events: Policy
Security Events: Proxy
Security Events: Reconnaissance
Security Events: Report
Security Events: Router/Switch
Security Events: Server
Security Events: Suspicious
Security Events: System
Security Events: Unified threat management
Security Events: User Activity
Security Events: VoIP
Security Events: VPN
Security Events: Vulnerability Scanner
Security Events: Web Server
Security Events: Wireless
Security Events: Wireless Security/Management
Unique Signatures by Data Source
Unique Signatures by Product Type
Unique Signatures by Source Category
Honeypot Activity
Policy and Configuration Changes
Security Operations Report
Tickets Ticket Report
Ticket Status
User Activity User Activity
Topic revision: r5 - 24 Sep 2021, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.