Audit Log Management

Ensure that logging destinations maintain adequate storage to comply with the enterprise’s audit log management process.


Login

Audit Log Management

Standardize time synchronization. Configure at least two synchronized time sources across enterprise assets, where supported.


Login

Audit Log Management

Configure detailed audit logging for enterprise assets containing sensitive data. Include event source, date, username, timestamp, source addresses, destination addresses, and other useful elements that could assist in a forensic investigation.


Login

Audit Log Management

Collect DNS query audit logs on enterprise assets, where appropriate and supported.


Login

Audit Log Management

Collect URL request audit logs on enterprise assets, where appropriate and supported.


Login

Audit Log Management

Collect command-line audit logs. Example implementations include collecting audit logs from PowerShell®, BASH™, and remote administrative terminals.


Login

Audit Log Management

Centralize, to the extent possible, audit log collection and retention across enterprise assets.


Login

Email and Web Browser Protections

Ensure only fully supported browsers and email clients are allowed to execute in the enterprise, only using the latest version of browsers and email clients provided through the vendor.


Login

Email and Web Browser Protections

Use DNS filtering services on all enterprise assets to block access to known malicious domains.


Login

Email and Web Browser Protections

Enforce and update network-based URL filters to limit an enterprise asset from connecting to potentially malicious or unapproved websites. Example implementations include category-based filtering, reputation-based filtering, or through the use of block lists. Enforce filters for all enterprise assets.


Login