How can ManageEngine support PNCiber compliance?
With ManageEngine AD360, organizations can begin aligning with PNCiber principles through centralized identity governance, multi-factor authentication, continuous monitoring of access to personal data, real-time threat detection, and comprehensive audit trails to support regulatory and audit requirements.
Art. 2.II The guarantee of fundamental rights, in particular freedom of expression, personal data protection, privacy protection, and access to information.
Ensure people can speak freely, keep their personal data and privacy safe, and still get the information they need. In practice, cybersecurity measures cannot be used as an excuse to spy on people or block access to information without good legal reason.
- Password/Account Expiry Notifications Delivery Report
- Soon-To-Expire User Passwords Report
- Password Expired Users Report
- Notification Delivery Report
- Local account & privilege monitoring
- Adaptive MFA
- Approval-based access workflows
Art. 2.III The prevention of incidents and cyberattacks, especially those targeting national critical infrastructures and essential services provided to society
Focus on protecting critical infrastructure such as defense systems or government intelligence and the most important services people rely on every day, such as electricity, hospitals, banking, transport, and communication systems from cyberattacks.
- Locked-Out Users Report
- Blocked Users Report
- MFA Usage Audit Report
- MFA Usage for Machine/VPN/OWA Logins
- MFA Usage from Mobile Devices
- MFA Failures Report
- MFA Non-Enrolled Users Report
- Offline MFA Enrolled Machines Report
- Agent Installation Failures Report
- User Attempts Audit Report
- MFA enforcement (over 20 methods, including SMS, TOTP, push notifications, and biometrics)
- Strong password policies
- Adaptive account lockout across VPNs, Outlook on the web, IIS servers, and the cloud
Art. 2.IV The resilience of public and private organizations to incidents and cyberattacks
Eusure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.
- Agent Installed Machines Report
- Agent Installation Failures Report
- Offline MFA Enrolled Machines Report
- Locked-Out Users Report
- Blocked Users Report
Automated AD Backup & Rapid Recovery
Art. 3.II To ensure the confidentiality, integrity, authenticity, and availability of solutions and data used for the electronic or digital processing, storage, and transmission of information
Ensure that only the right people can see and change important data, that the data is genuine and hasn’t been tampered with, and that it’s always available when needed. In simple terms, it’s about keeping your systems and information safe, accurate, and reliably accessible at all times.
- Reset Password Audit Report
- Unlock Account Audit Report
- GINA/macOS/Linux Agent Reset Password Audit Report
- GINA/macOS/Linux Agent Unlock Account Audit Report
- Self-Update Audit Report
- Change Password Audit Report
- Password Expired Users Report
- Soon-To-Expire User Passwords Report
- Password/Account Expiry Notifications Delivery Report
- MFA Enrolled Users Report
- MFA Non-Enrolled Users Report
- MFA Enrollment Audit Report
- MFA Usage Audit Report
- MFA Usage for Machine/VPN/OWA Logins
- MFA Usage from Mobile Devices
- MFA Trusted Browser Report
- MFA Trusted Machines Report
- Security Questions Report
- Backup Code Usage Report
- Offline MFA Enrolled Machines Report
- FIDO Passkeys Report
- Licensed Users Report
- Application Access Audit Report
- JIT Provisioning Audit Report
- Adaptive MFA across endpoints and apps
- Secure SSO and centralized access management
- Approval-based workflows and access governance
- RBAC and delegated administration.
Art. 3.IV To contribute to the fight against cybercrime and other malicious activities in cyberspace
Helping police, governments, and companies spot, stop, and investigate cyber crimes like hacking, fraud, data theft, and more. It also means sharing information and tools so everyone can work together to make the online world safer and more difficultfor criminals to operate in.
- Blocked Users Report
- Reset Password Audit Report
- Unlock Account Audit Report
- GINA/macOS/Linux Agent Reset Password Audit Report
- GINA/macOS/Linux Agent Unlock Account Audit Report
- Change Password Audit Report
- MFA Failures Report
- Backup Code Usage Report
- User Attempts Audit Report
- Application Access Audit Report
- Account misuse and valid-account abuse control
- Automated dormant account cleanup
- Identity lifecycle management
Art. 3.V To encourage the adoption of cyber protection and risk management measures to prevent, avoid, mitigate, reduce, and neutralize vulnerabilities, incidents, and cyberattacks and their impacts
Helping organizations actually put in place security tools and routines so they can find and fix weaknesses before attackers use them. It also means reducing the damage when attacks do happen, so incidents are contained quickly and have as little impact as possible.
- Locked-Out Users Report
- Soon-To-Expire User Passwords Report
- Password Expired Users Report
- Password/Account Expiry Notifications Delivery Report
- Self-Update Audit Report
- MFA Enrolled Users Report
- MFA Non-Enrolled Users Report
- MFA Enrollment Audit Report
- MFA Usage Audit Report
- MFA Trusted Browser Report
- MFA Trusted Machines Report
- Security Questions Report
- Backup Code Usage Report
- Offline MFA Enrolled Machines Report
- FIDO Passkeys Report
- Licensed Users Report
- Agent Installed Machines Report
- Agent Installation Failures Report
- Notification Delivery Report
- Push Registered Devices Report
- JIT Provisioning Audit Report
- Identity risk assessment
- Dormant account cleanup
- Privileged group audits
- Access certification campaigns
Art. 3.VI To enhance the resilience of public and private organizations to incidents and cyberattacks
Ensure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.
- Offline MFA Enrolled Machines Report
- Locked-Out Users Report
- Blocked Users Report
- Agent Installed Machines Report
- Privileged access analysis
- Automated provisioning/deprovisioning
- RBAC with OU delegation
- Multi-point-in-time AD backups for rapid recovery
Art. 3.X To develop regulatory, oversight, and control mechanisms aimed at improving national cybersecurity and resilience
Create rules, monitoring systems, and checks that help make Brazil's digital infrastructure stronger and more secure against cyber threats. In simple terms, it focuses on building oversight tools and controls to continuously improve how the country detects, responds to, and recovers from cyberattacks.
- Reset Password Audit Report
- Unlock Account Audit Report
- GINA/macOS/Linux Agent Reset Password Audit Report
- GINA/macOS/Linux Agent Unlock Account Audit Report
- Self-Update Audit Report
- Change Password Audit Report
- Password/Account Expiry Notifications Delivery Report
- MFA Enrollment Audit Report
- MFA Usage Audit Report
- MFA Failures Report
- Security Questions Report
- Backup Code Usage Report
- User Attempts Audit Report
- Notification Delivery Report
- Application Access Audit Report
- JIT Provisioning Audit Report
- Privileged access governance
- Access review
- Zero trust enforcement
Art. 6.III CNCiber Responsibility: Formulating proposals to improve the prevention, detection, analysis, and response to cyber incidents.
CNCiber's responsibility is to suggest practical improvements for better preventing cyber attacks, spotting them early, investigating what happened, and responding effectively to minimize damage. In simple terms, they recommend ways to make organizations stronger at stopping threats before they strike and handling incidents quickly when they do occur.
- Locked-Out Users Report
- Blocked Users Report
- Reset Password Audit Report
- Unlock Account Audit Report
- GINA/macOS/Linux Agent Reset Password Audit Report
- GINA/macOS/Linux Agent Unlock Account Audit Report
- Change Password Audit Report
- MFA Enrollment Audit Report
- MFA Usage Audit Report
- MFA Usage for Machine/VPN/OWA Logins
- MFA Usage from Mobile Devices
- MFA Failures Report
- Backup Code Usage Report
- User Attempts Audit Report
- Automated provisioning/deprovisioning
- Approval workflows for admin changes
- Rapid search and filtering of identity events
- Forensic AD change reports
Disclaimer: The information provided on this page is for general knowledge and awareness purposes only. It is not intended to serve as professional, legal, or regulatory advice. Compliance with PNCiber depends on your organization’s specific environment, processes, and risk profile.
To accurately assess your compliance posture, we strongly recommend engaging a qualified consultant, compliance agency, or referring directly to the official PNCiber documentation and guidelines.
