Security Best Practices Report

Overview

The Security Best Practices report provides the organization with the ability to ensure that security controls are based on common security best practices and to detect best practice failures. It lists all the rules that violate each best practice.

This report enables you to:

  • Identify the locations of risks across your network and which devices are most impacted

  • Prioritize rule optimization and remediation

  • Ensure awareness of the state of your network for audit purposes

Security Best Practices report supports the PCI DSS v4.0 standards.

What Can I See Here?

General Information

This section shows information such as report ID, name, time, and the domain details including the best practices selected during report creation.

Summary

This section shows the total number of rules and objects with the breakdown by severity.

Rule and Object Best Practices per Device

These sections show the best practices that you selected when creating the report and the number of rules or objects that violate the best practices. The color of the bar next to the best practice indicates the severity of the violation:

Hover over a tooltip to see an explanation for the best practice:

Click a best practice to see the violations details in a new section:

This compliance measurement shows the overall percentage of compliance for all best practices.

It is calculated as follows:

Create a Security Best Practices Report

Prerequisites

Procedure

  1. From the Create () menu, click Security Best Practices.

    The Setup page for the report appears.

  2. Complete the report fields:

    • General: Report name.

    • Domains and Devices: Select a domain and one or more devices or device groups.

    • Best Practices: Select the Best Practices Type. For best practices that require a value, you must supply the value AND select the check box. If not selected, STRE ignores the best practice.

    • STRE only supports the following options for the risky services field:
      • <tcp/udp>:<port> format

      • icmp

    • Export Report:

      • Email: Specify the recipients for notification emails. Press Tab or Enter to separate multiple email addresses.

        The email message contains a link to the report in STRE. Reports can be generated as PDF or CSV files, and you can select either option or both (if enabled) to include in the email as an attachment. If the report file is larger than 4 MB, the attachment is compressed as a .zip file.

      • Remote Repository: STRE can export reports using SFTP. Specify the report format - PDF or CSV.

        If the report finished successfully, you can verify that the new files appear in the Reports Folder path, in the remote repository, configured by your administrator (see Send Reports Using SFTP).

    • Schedule: Configure the following:
      • Repeats: Select the frequency by which the report should run. Options include Daily, Weekly, and Monthly.
      • Days of the week: Select one or more days on which the report should run.
      • Time: Indicate the time at which the report should run.
  3. Click one of the following:

    : Saves the report. The Saved menu lists all saved and scheduled reports.

    : Runs the report. After a report runs, you can view the results in the Repo menu.

Available Report Formats

When viewing the report output, use the Export menu to save the report data.

You can save the data for this report as a CSV file or PDF file. The CSV export option is useful when you want to create your own reports based on the specific data from the report configuration. The PDF output is limited to 100 rules.