STIGhub
STIGs
RMF Controls
Compare
← SI-4 (22) — System Monitoring
CCI-002684
Definition
Audit and/or alert organization-defined personnel when unauthorized network services are detected.
Parent Control
SI-4 (22)
System Monitoring
System and Information Integrity
Linked STIG Checks (21)
V-205014
CAT II
The ALG providing content filtering must generate a log record when unauthorized network services are detected.
Application Layer Gateway Security Requirements Guide
V-205015
CAT II
The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
Application Layer Gateway Security Requirements Guide
V-266146
CAT II
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-266161
CAT II
The F5 BIG-IP appliance providing content filtering must generate a log record when unauthorized network services are detected.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-65285
CAT II
The DataPower Gateway providing content filtering must generate a log record when unauthorized network services are detected.
IBM DataPower ALG Security Technical Implementation Guide
V-65287
CAT II
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
IBM DataPower ALG Security Technical Implementation Guide
V-55377
CAT II
The IDPS must generate a log record when unauthorized network services are detected.
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
V-55379
CAT II
The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
V-206911
CAT II
The IDPS must generate a log record when unauthorized network services are detected.
Intrusion Detection and Prevention Systems Security Requirements Guide
V-206912
CAT II
The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.
Intrusion Detection and Prevention Systems Security Requirements Guide
V-272882
CAT II
Microsoft Defender for Endpoint (MDE) must alert administrators on policy violations defined for endpoints.
Microsoft Defender for Endpoint Security Technical Implementation Guide
V-228866
CAT II
The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.
Palo Alto Networks ALG Security Technical Implementation Guide
V-228867
CAT II
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
Palo Alto Networks ALG Security Technical Implementation Guide
V-207707
CAT II
The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.
Palo Alto Networks IDPS Security Technical Implementation Guide
V-207708
CAT II
The Palo Alto Networks security platform must generate an alert to the ISSO and ISSM, at a minimum, when unauthorized network services are detected.
Palo Alto Networks IDPS Security Technical Implementation Guide
V-279203
CAT II
The Edge SWG must control remote access methods.
Symantec Edge SWG ALG Security Technical Implementation Guide
V-94337
CAT II
Symantec ProxySG providing content filtering must generate a log record when access attempts to unauthorized websites and/or services are detected.
Symantec ProxySG ALG Security Technical Implementation Guide
V-94339
CAT II
Symantec ProxySG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when access attempts to unauthorized websites and/or services are detected.
Symantec ProxySG ALG Security Technical Implementation Guide
V-241172
CAT II
Trend Deep Security must, when unauthorized network services are detected, log the event and alert the ISSO, ISSM, and other individuals designated by the local organization.
Trend Micro Deep Security 9.x Security Technical Implementation Guide
V-242199
CAT I
The TPS must generate a log record so an alert can be configured to, at a minimum, the system administrator when malicious code is detected.
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
V-242202
CAT II
The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.
Trend Micro TippingPoint IDPS Security Technical Implementation Guide