Why AD360
 
Solutions
 
Resources
 
 

Achieve PNCiber compliance with ManageEngine

PNCiber is Brazil's official National Cybersecurity Policy, established in December 2023 by Decree No. 11,856. It provides a framework for cybersecurity governance across the government, private sector, and society that aims to protect critical infrastructure, personal data, and uphold national digital sovereignty.

Compliance

How can ManageEngine support PNCiber compliance?

With ManageEngine AD360, organizations can begin aligning with PNCiber principles through centralized identity governance, multi-factor authentication, continuous monitoring of access to personal data, real-time threat detection, and comprehensive audit trails to support regulatory and audit requirements.

Art. 2.II The guarantee of fundamental rights, in particular freedom of expression, personal data protection, privacy protection, and access to information.

Compliance actions Reports IAM Controls

Ensure people can speak freely, keep their personal data and privacy safe, and still get the information they need. In practice, cybersecurity measures cannot be used as an excuse to spy on people or block access to information without good legal reason.

  1. Password/Account Expiry Notifications Delivery Report
  2. Soon-To-Expire User Passwords Report
  3. Password Expired Users Report
  4. Notification Delivery Report
  1. Local account & privilege monitoring
  2. Adaptive MFA
  3. Approval-based access workflows

Art. 2.III The prevention of incidents and cyberattacks, especially those targeting national critical infrastructures and essential services provided to society

Compliance actions Reports IAM Controls

Focus on protecting critical infrastructure such as defense systems or government intelligence and the most important services people rely on every day, such as electricity, hospitals, banking, transport, and communication systems from cyberattacks.

  1. Locked-Out Users Report
  2. Blocked Users Report
  3. MFA Usage Audit Report
  4. MFA Usage for Machine/VPN/OWA Logins
  5. MFA Usage from Mobile Devices
  6. MFA Failures Report
  7. MFA Non-Enrolled Users Report
  8. Offline MFA Enrolled Machines Report
  9. Agent Installation Failures Report
  10. User Attempts Audit Report
  1. MFA enforcement (over 20 methods, including SMS, TOTP, push notifications, and biometrics)
  2. Strong password policies
  3. Adaptive account lockout across VPNs, Outlook on the web, IIS servers, and the cloud

Art. 2.IV The resilience of public and private organizations to incidents and cyberattacks

Compliance actions Reports IAM Controls

Eusure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.

  1. Agent Installed Machines Report
  2. Agent Installation Failures Report
  3. Offline MFA Enrolled Machines Report
  4. Locked-Out Users Report
  5. Blocked Users Report

Automated AD Backup & Rapid Recovery

Art. 3.II To ensure the confidentiality, integrity, authenticity, and availability of solutions and data used for the electronic or digital processing, storage, and transmission of information

Compliance actions Reports IAM Controls

Ensure that only the right people can see and change important data, that the data is genuine and hasn’t been tampered with, and that it’s always available when needed. In simple terms, it’s about keeping your systems and information safe, accurate, and reliably accessible at all times.

  1. Reset Password Audit Report
  2. Unlock Account Audit Report
  3. GINA/macOS/Linux Agent Reset Password Audit Report
  4. GINA/macOS/Linux Agent Unlock Account Audit Report
  5. Self-Update Audit Report
  6. Change Password Audit Report
  7. Password Expired Users Report
  8. Soon-To-Expire User Passwords Report
  9. Password/Account Expiry Notifications Delivery Report
  10. MFA Enrolled Users Report
  11. MFA Non-Enrolled Users Report
  12. MFA Enrollment Audit Report
  13. MFA Usage Audit Report
  14. MFA Usage for Machine/VPN/OWA Logins
  15. MFA Usage from Mobile Devices
  16. MFA Trusted Browser Report
  17. MFA Trusted Machines Report
  18. Security Questions Report
  19. Backup Code Usage Report
  20. Offline MFA Enrolled Machines Report
  21. FIDO Passkeys Report
  22. Licensed Users Report
  23. Application Access Audit Report
  24. JIT Provisioning Audit Report
  1. Adaptive MFA across endpoints and apps
  2. Secure SSO and centralized access management
  3. Approval-based workflows and access governance
  4. RBAC and delegated administration.

Art. 3.IV To contribute to the fight against cybercrime and other malicious activities in cyberspace

Compliance actions Reports Controls to Implement

Helping police, governments, and companies spot, stop, and investigate cyber crimes like hacking, fraud, data theft, and more. It also means sharing information and tools so everyone can work together to make the online world safer and more difficultfor criminals to operate in.

  1. Blocked Users Report
  2. Reset Password Audit Report
  3. Unlock Account Audit Report
  4. GINA/macOS/Linux Agent Reset Password Audit Report
  5. GINA/macOS/Linux Agent Unlock Account Audit Report
  6. Change Password Audit Report
  7. MFA Failures Report
  8. Backup Code Usage Report
  9. User Attempts Audit Report
  10. Application Access Audit Report
  1. Account misuse and valid-account abuse control
  2. Automated dormant account cleanup
  3. Identity lifecycle management

Art. 3.V To encourage the adoption of cyber protection and risk management measures to prevent, avoid, mitigate, reduce, and neutralize vulnerabilities, incidents, and cyberattacks and their impacts

Compliance actions Reports IAM Controls

Helping organizations actually put in place security tools and routines so they can find and fix weaknesses before attackers use them. It also means reducing the damage when attacks do happen, so incidents are contained quickly and have as little impact as possible.

  1. Locked-Out Users Report
  2. Soon-To-Expire User Passwords Report
  3. Password Expired Users Report
  4. Password/Account Expiry Notifications Delivery Report
  5. Self-Update Audit Report
  6. MFA Enrolled Users Report
  7. MFA Non-Enrolled Users Report
  8. MFA Enrollment Audit Report
  9. MFA Usage Audit Report
  10. MFA Trusted Browser Report
  11. MFA Trusted Machines Report
  12. Security Questions Report
  13. Backup Code Usage Report
  14. Offline MFA Enrolled Machines Report
  15. FIDO Passkeys Report
  16. Licensed Users Report
  17. Agent Installed Machines Report
  18. Agent Installation Failures Report
  19. Notification Delivery Report
  20. Push Registered Devices Report
  21. JIT Provisioning Audit Report
  1. Identity risk assessment
  2. Dormant account cleanup
  3. Privileged group audits
  4. Access certification campaigns

Art. 3.VI To enhance the resilience of public and private organizations to incidents and cyberattacks

Compliance actions Reports IAM Controls

Ensure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.

  1. Offline MFA Enrolled Machines Report
  2. Locked-Out Users Report
  3. Blocked Users Report
  4. Agent Installed Machines Report
  1. Privileged access analysis
  2. Automated provisioning/deprovisioning
  3. RBAC with OU delegation
  4. Multi-point-in-time AD backups for rapid recovery

Art. 3.X To develop regulatory, oversight, and control mechanisms aimed at improving national cybersecurity and resilience

Compliance actions Reports SIEM Controls

Create rules, monitoring systems, and checks that help make Brazil's digital infrastructure stronger and more secure against cyber threats. In simple terms, it focuses on building oversight tools and controls to continuously improve how the country detects, responds to, and recovers from cyberattacks.

  1. Reset Password Audit Report
  2. Unlock Account Audit Report
  3. GINA/macOS/Linux Agent Reset Password Audit Report
  4. GINA/macOS/Linux Agent Unlock Account Audit Report
  5. Self-Update Audit Report
  6. Change Password Audit Report
  7. Password/Account Expiry Notifications Delivery Report
  8. MFA Enrollment Audit Report
  9. MFA Usage Audit Report
  10. MFA Failures Report
  11. Security Questions Report
  12. Backup Code Usage Report
  13. User Attempts Audit Report
  14. Notification Delivery Report
  15. Application Access Audit Report
  16. JIT Provisioning Audit Report
  1. Privileged access governance
  2. Access review
  3. Zero trust enforcement

Art. 6.III CNCiber Responsibility: Formulating proposals to improve the prevention, detection, analysis, and response to cyber incidents.

Compliance actions Reports IAM Controls

CNCiber's responsibility is to suggest practical improvements for better preventing cyber attacks, spotting them early, investigating what happened, and responding effectively to minimize damage. In simple terms, they recommend ways to make organizations stronger at stopping threats before they strike and handling incidents quickly when they do occur.

  1. Locked-Out Users Report
  2. Blocked Users Report
  3. Reset Password Audit Report
  4. Unlock Account Audit Report
  5. GINA/macOS/Linux Agent Reset Password Audit Report
  6. GINA/macOS/Linux Agent Unlock Account Audit Report
  7. Change Password Audit Report
  8. MFA Enrollment Audit Report
  9. MFA Usage Audit Report
  10. MFA Usage for Machine/VPN/OWA Logins
  11. MFA Usage from Mobile Devices
  12. MFA Failures Report
  13. Backup Code Usage Report
  14. User Attempts Audit Report
  1. Automated provisioning/deprovisioning
  2. Approval workflows for admin changes
  3. Rapid search and filtering of identity events
  4. Forensic AD change reports

Disclaimer: The information provided on this page is for general knowledge and awareness purposes only. It is not intended to serve as professional, legal, or regulatory advice. Compliance with PNCiber depends on your organization’s specific environment, processes, and risk profile.

To accurately assess your compliance posture, we strongly recommend engaging a qualified consultant, compliance agency, or referring directly to the official PNCiber documentation and guidelines.

 
Chat now
   

Hello!
How can we help you?

I have a sales question  

I need a personalized demo  

I have a product query  

E-mail our sales team  

Book a meeting  

Chat with sales now  

Back

Book your personalized demo

Thanks for registering, we will get back at you shortly!

Preferred date for demo
  •  
    • Please choose an option.
    • Please choose an option.
  •  
  •  
    This field is required.

    Done

     
  • Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Schedule a demo’, you agree to processing of personal data according to the Privacy Policy.
Back

Book a meeting

Thanks for registering, we will get back at you shortly!

Topic

What would you like to discuss?

  •  
  • Details
  •  
    • Please choose an option.
    • Please choose an option.
    Contact Information
    •  
    •  
    •  
    •  
  • By clicking ‘Book Meeting’, you agree to processing of personal data according to the Privacy Policy.