Alarms | Alarm Report |
| Malware Alarms |
Asset | Asset Compliance Report |
| Asset Report |
| Availability Report |
| Vulnerabilities Report |
Compliance | Application Exploits |
| Business and Compliance |
| DFARS Default Account Usage |
| DFARS Remote Access Report |
| DFARS Unencrypted Traffic |
| FERPA Default Account Usage |
| FERPA Remote Access Report |
| FERPA Unencrypted Traffic |
| FISMA Report |
| GLBA: File Adds or Deletes |
| GLBA: File Changes |
| GLBA: Firewall User Changes |
| GLBA: Group Changes |
| GLBA: MAC Address Changes |
| GLBA: Policy and Configuration Changes |
| GLBA: Registry Changes |
| GLBA: System Failed Logins |
| GLBA: System Successful Logons |
| GLBA: System Time Changes |
| GLBA: User Account Changes |
| GLBA: User Activity |
| HIPAA Report |
| HIPAA: Account Lockouts |
| HIPAA: Account Unlock Report |
| HIPAA: Authentication Failed Logins |
| HIPAA: Database Failed Logons |
| HIPAA: Database Successful Logons |
| HIPAA: Failed Logins |
| HIPAA: Failed Logon to Firewall |
| HIPAA: FTP Failed Logons |
| HIPAA: FTP Successful Logons |
| HIPAA: List of identified ePHI assets |
| HIPAA: List of identified ePHI assets with Services |
| HIPAA: Password Change Status |
| HIPAA: Successful Logon to Firewall |
| HIPAA: System Failed Logins |
| HIPAA: System Successful Logons |
| ISO 27002: Accounts Locked Out |
| ISO 27002: Accounts Unlocked |
| ISO 27002: Active Directory Group Additions |
| ISO 27002: Active Directory Group Removals |
| ISO 27002: Administrative Logon |
| ISO 27002: Antivirus Disabled |
| ISO 27002: Antivirus Events Detected |
| ISO 27002: Assets with Vulnerabilities |
| ISO 27002: Database Failed Logons |
| ISO 27002: Database Successful Logons |
| ISO 27002: Failed Logon to Firewall |
| ISO 27002: FTP Failed Logons |
| ISO 27002: FTP Successful Logons |
| ISO 27002: Identified Services on a Group of Systems |
| ISO 27002: List of Identified Assets |
| ISO 27002: Successful Logon to Firewall |
| ISO 27002: System Failed Logons |
| ISO 27002: System Successful Logons |
| NERC CIP: IPv6 Detection |
| NERC CIPv5: Antivirus Details |
| NERC CIPv5: Antivirus Disabled |
| NERC CIPv5: Current Vulnerabilities Report |
| NERC CIPv5: Database Failed Logons |
| NERC CIPv5: Database Successful Logons |
| NERC CIPv5: Failed Logon to Firewall |
| NERC CIPv5: File Adds or Deletes |
| NERC CIPv5: File Changes |
| NERC CIPv5: FTP Failed Logons |
| NERC CIPv5: FTP Successful Logons |
| NERC CIPv5: List of identified BES Cyber Assets |
| NERC CIPv5: List of identified BES Cyber Assets with Services |
| NERC CIPv5: MAC Address Changes |
| NERC CIPv5: New Software Installed |
| NERC CIPv5: Password Change Status |
| NERC CIPv5: Registry Adds or Deletes |
| NERC CIPv5: Registry Changes |
| NERC CIPv5: System Failed Logins |
| NERC CIPv5: System Successful Logons |
| NERC CIPv5: Sheriff CSM User Activity |
| NIST 800-171 Default Account Usage |
| NIST 800-171 Remote Access Report |
| NIST 800-171 Unencrypted Traffic |
| PCI 2.0 Report |
| PCI 3.0 Report |
| PCI DSS 3.2: All Antivirus Security Risk Events |
| PCI DSS 3.2: All Virus Events |
| PCI DSS 3.2: Encrypted Networks Having Unencrypted APs |
| PCI DSS 3.2: Access Control Device Denied |
| PCI DSS 3.2: Account Lockouts |
| PCI DSS 3.2: Account Unlock Report |
| PCI DSS 3.2: Admin Access to Systems |
| PCI DSS 3.2: Antivirus Definition Updates |
| PCI DSS 3.2: Antivirus Disabled |
| PCI DSS 3.2: Antivirus Failed Updates |
| PCI DSS 3.2: Authentications with Default Credentials |
| PCI DSS 3.2: Cloaked Wireless Networks with Uncloaked APs |
| PCI DSS 3.2: Database Configuration Changes |
| PCI DSS 3.2: Database Errors |
| PCI DSS 3.2: Database Failed Logins |
| PCI DSS 3.2: Database Successful Logins |
| PCI DSS 3.2: Database Users Added |
| PCI DSS 3.2: Database Users Removed |
| PCI DSS 3.2: Dropped or Denied Connections |
| PCI DSS 3.2: Encrypted HTTPS Connections |
| PCI DSS 3.2: Encrypted VPN Client Connections Accepted |
| PCI DSS 3.2: Encrypted VPN Client Connections Failed |
| PCI DSS 3.2: Environment User Activity |
| PCI DSS 3.2: Failed Logins |
| PCI DSS 3.2: Firewall Configuration Changes |
| PCI DSS 3.2: Firewall Failed Authentication |
| PCI DSS 3.2: Firewall Intrusion Detection |
| PCI DSS 3.2: Firewall Successful Authentication |
| PCI DSS 3.2: Firewall User Changes |
| PCI DSS 3.2: Group Changes |
| PCI DSS 3.2: Infected Computers |
| PCI DSS 3.2: Information Security Policy Compliance Checks |
| PCI DSS 3.2: Information Security Policy Compliance Failed |
| PCI DSS 3.2: Intrusion Detection Events |
| PCI DSS 3.2: Security Device Policy Modifications |
| PCI DSS 3.2: Successful Logins |
| PCI DSS 3.2: Suspicious Clients on Wireless Networks |
| PCI DSS 3.2: Suspicious Database Events |
| PCI DSS 3.2: System Time Changes |
| PCI DSS 3.2: User Management Activity |
| PCI DSS 3.2: Vulnerability Details |
| PCI DSS 3.2: Wireless Networks |
| PCI DSS 3.2: Wireless Networks Using Weak Encryption |
| PCI: File Integrity Changes |
| PCI: User Management Activity |
| SOX Report |
Raw Logs | Raw Logs |
| Raw Logs: Access |
| Raw Logs: Alarm |
| Raw Logs: Alert |
| Raw Logs: Anomaly Detection |
| Raw Logs: Antivirus |
| Raw Logs: Application |
| Raw Logs: Application Firewall |
| Raw Logs: Applications |
| Raw Logs: Authentication |
| Raw Logs: Authentication and DHCP |
| Raw Logs: Availability |
| Raw Logs: Data Protection |
| Raw Logs: Database |
| Raw Logs: Denial of Service |
| Raw Logs: Exploit |
| Raw Logs: Firewall |
| Raw Logs: Honeypot |
| Raw Logs: Info |
| Raw Logs: Infrastructure Monitoring |
| Raw Logs: Intrusion Detection |
| Raw Logs: Intrusion Prevention |
| Raw Logs: Inventory |
| Raw Logs: Mail Security |
| Raw Logs: Mail Server |
| Raw Logs: Malware |
| Raw Logs: Management Platform |
| Raw Logs: Network |
| Raw Logs: Network Discovery |
| Raw Logs: Operating System |
| Raw Logs: Other Devices |
| Raw Logs: Policy |
| Raw Logs: Proxy |
| Raw Logs: Reconnaissance |
| Raw Logs: Router/Switch |
| Raw Logs: Server |
| Raw Logs: Suspicious |
| Raw Logs: System |
| Raw Logs: Unified threat management |
| Raw Logs: Voip |
| Raw Logs: VPN |
| Raw Logs: Vulnerability Scanner |
| Raw Logs: Web Server |
| Raw Logs: Wireless |
| Raw Logs: Wireless Security/Management |
Security Events | Activity from OTX Pulses |
| Activity with OTX IP Reputation Information |
| Database Activity |
| Events by Data Source |
| Events by Product Type |
| Events by Source Category |
| Geographic Report |
| Security Events: Access |
| Security Events: Account Changes |
| Security Events: Admin Access |
| Security Events: Alarm |
| Security Events: Alert |
| Security Events: Anomaly Detection |
| Security Events: Antivirus |
| Security Events: Application |
| Security Events: Application Firewall |
| Security Events: Applications |
| Security Events: Authentication |
| Security Events: Authentication and DHCP |
| Security Events: Availability |
| Security Events: Data Protection |
| Security Events: Database |
| Security Events: Denial of Service |
| Security Events: Exploit |
| Security Events: Firewall |
| Security Events: Honeypot |
| Security Events: Impacts |
| Security Events: Info |
| Security Events: Infrastructure Monitoring |
| Security Events: Intrusion Detection |
| Security Events: Intrusion Prevention |
| Security Events: Inventory |
| Security Events: Mail Security |
| Security Events: Mail Server |
| Security Events: Malware |
| Security Events: Management Platform |
| Security Events: Network |
| Security Events: Network Discovery |
| Security Events: Operating System |
| Security Events: Other Devices |
| Security Events: Policy |
| Security Events: Proxy |
| Security Events: Reconnaissance |
| Security Events: Report |
| Security Events: Router/Switch |
| Security Events: Server |
| Security Events: Suspicious |
| Security Events: System |
| Security Events: Unified threat management |
| Security Events: User Activity |
| Security Events: VoIP |
| Security Events: VPN |
| Security Events: Vulnerability Scanner |
| Security Events: Web Server |
| Security Events: Wireless |
| Security Events: Wireless Security/Management |
| Unique Signatures by Data Source |
| Unique Signatures by Product Type |
| Unique Signatures by Source Category |
| Honeypot Activity |
| Policy and Configuration Changes |
| Security Operations Report |
Tickets | Ticket Report |
| Ticket Status |
User Activity | User Activity |