How can ManageEngine support LGPD compliance?
With ManageEngine Log360, organizations can begin aligning with LGPD principles through centralized identity governance, multi-factor authentication, continuous monitoring of access to personal data, real-time threat detection, and comprehensive audit trails to support regulatory and audit requirements.
Article 6: General Principles of Personal Data Processing
Organizations must ensure all personal-data processing aligns with LGPD’s ten principles: Purpose, Adequacy, Necessity, Free Access, Data Quality, Transparency, Security, Prevention, Non-discrimination, and Accountability. These principles must guide the entire data lifecycle—from collection to deletion—and serve as the foundation for evaluating and demonstrating compliance.
- Unauthorized access to PII directories or tables
- Mass file access / exfiltration anomaly
- Disabling of security tools (Defender, Firewall, ETW, Sysmon)
- Clearing event logs
- Suspicious scheduled tasks / persistence mechanisms
- Ransomware encryption patterns
- Database DML/DDL changes on PII tables
- Unauthorized sharing or outbound transfers
- Correlated Events Report
- File Integrity Monitoring Summary Report
- UEBA Anomaly Report
- Database Query Access Logs
- DML/DDL Change Monitoring Report
- Log Integrity Verification Report
- Privilege Escalation Attempts Report
- Suspicious Outbound Transfer Report
- Security Control Tampering Report (Firewall/Defender/ETW)
- File Access & Integrity Reports
- Data Classification Evidence
- USB/Email/Web DLP Violations
- Ransomware Detection Logs
- Correlated Events Report
- File Integrity Monitoring Summary Report
- UEBA Anomaly Report
- Database Query Access Logs
- DML/DDL Change Monitoring Report
- Log Integrity Verification Report
- Privilege Escalation Attempts Report
- Suspicious Outbound Transfer Report
- Security Control Tampering Report (Firewall/Defender/ETW)
- File Access & Integrity Reports
- Data Classification Evidence
- USB/Email/Web DLP Violations
- Ransomware Detection Logs
Articles 17–22: Data subject rights
LGPD grants individuals full control over their personal data, allowing them to access, correct, delete, transfer, or request human review of automated decisions. Organizations must provide clear, timely responses and maintain full traceability of all actions taken on a data subject’s personal data.
- Windows Firewall Settings Have Been Changed
- Disable Microsoft Defender Firewall via Registry
- Firewall Disabled via Netsh.EXE
- New Firewall Rule Added Via Netsh.EXE
- Disable Windows Firewall by Registry
- Firewall IPS Signature Detected
- Windows Defender Service Disabled – Registry
- Disable Windows Defender Functionalities Via Registry Keys
- Windows Defender Exclusions Added – Registry
- Windows Defender Exclusions Added – PowerShell
- PowerShell Disable Security Monitoring
- Disable Macro Runtime Scan Scope
- PowerShell Logging Disabled Via Registry Key Tampering
- Security Eventlog Cleared
- Potential EventLog File Location Tampering
- EventLog EVTX File Deleted
- EventLog Query Requests by Built-in Utilities
- Clear PowerShell History – PowerShell
- PowerShell Console History Logs Deleted
- IIS WebServer Access Logs Deleted
- Tomcat WebServer Logs Deleted
- ETW Logging Disabled in .NET Processes – Sysmon Registry
- ETW Logging Disabled for rpcrt4.dll
- ETW Logging Disabled for SCM
- ETW Trace Evasion Activity
- Disable of ETW Trace – PowerShell
- Suspicious Modification of Scheduled Tasks
- Suspicious Scheduled Tasks Created During Non-working Hours
- Suspicious Scheduled Task Creation Involving Temp Folder
- Delete Important Scheduled Task
- Delete All Scheduled Tasks
- PUA – Sysinternal Tool Execution – Registry
- Ransomware Detections
- Windows Backup Deleted via Wbadmin.EXE
- All Backups Deleted via Wbadmin.EXE
- Periodic Backup for System Registry Hives Enabled
- Database Query / Select Audit Report
- Database DDL / DML Change Reports
- Data Sharing / Transfer Activity Report
- Data Retention & Archival Report
- Database query logging to confirm processing activities
- DML/DDL change monitoring to verify correction and deletion operations
- Outbound data transfer auditing for data sharing and disclosures
- WORM tamper-proof log storage for regulatory evidence preservation
Article 37: Accountability and documentation
Any organization handling personal data must keep written records of what data they process, why they process it, and how. This is especially important when using “legitimate interest” as the legal basis. These records help prove to regulators that the organization is handling data responsibly and transparently.
Log Tampering & Log Deletion Detection
- EventLog EVTX File Deleted
- Security Eventlog Cleared
- Event Logs Cleared
- Suspicious Eventlog Clear or Configuration Using Wevtutil
- Event Logging Service Shutdown
- EventLog File Location Tampering
- Audit Events Dropped
- Error in EventLog Service
- Audit Logs Cleared (Windows Important Events)
Audit Evasion & Traceability Evasion Rules
- ETW Logging Disabled in .NET Processes
- ETW Trace Evasion Activity
- Disable of ETW Trace – PowerShell
- PowerShell Logging Disabled via Registry Key Tampering
- Clear PowerShell History – PowerShell
- PowerShell Console History Logs Deleted
Privilege & Configuration Integrity Rules
- User Added to Local Administrators
- Privilege Assigned to New Logon
System Stability & Evidence Preservation
- Application Errors / System Errors / EMET Logs
- Blue Screen Error (BSOD)
- Service State Change
- Event Logger Started
Ransomware or Destructive Activity
- Ransomware Detections
- Shadow Copies Deletion Using OS Utilities
- Backup Catalog Deleted
Windows & SIEM Event Monitoring
- All Events (Windows)
- Important Events (Windows)
- Weekly / Monthly Activity Summary Reports
- Security Log Full Report
Log Tampering & Integrity
- Audit Logs Cleared Report
- Event Logging Service Shutdown Report
- EventLog Tampering Reports
- Security Event Log Clearance Attempts
Authentication & Privilege Monitoring
- Failed Logons (all categories)
- Locked-Out Users Report
- User Account Management Reports
- Privilege Use Reports
System & Policy Change Monitoring
- Configuration Change Reports
- Policy Change Reports
- Audit Policy Change Reports
- System Error / Application Error Reports
Data Access, DLP & Ransomware
- File Read / Access Reports
- File Modification Reports
- File Deletion Reports
- File Creation Reports
- Permission Modification Reports
- Top File Operations Reports
- Removable Media Access Reports
- Ransomware Detection Reports
Centralized Log Collection & Integrity
- Log collection from all critical systems (Windows, AD, databases, network)
- Log integrity monitoring (log deletion, clearing, overwriting)
- Long-term log retention policies
Privilege, Configuration & Governance Monitoring
- Privileged activity monitoring across infrastructure
- Configuration change auditing
- Policy and audit policy change monitoring
- Privilege use auditing
File Integrity, Data Access & DLP
- File integrity monitoring for critical evidence repositories
- File access auditing
- File modification logging
- File deletion monitoring
- Permission change auditing
- Sensitive data discovery and classification
- Endpoint DLP controls for file-transfer traceability
Security, Stability & Incident Evidence
- Windows security log auditing
- System and application error logging
- Log tampering detection (log cleared, service stopped)
- Incident timeline reconstruction
- Ransomware detection
Article 41: Data Protection Officer (DPO) & Establishment of a Communication Channel
Organizations must appoint a Data Protection Officer (DPO) to act as the main contact for data subjects and the ANPD. The DPO oversees compliance efforts, handles data-subject requests, supports incident response, and ensures transparency. A clear, publicly available communication channel must be provided so individuals can easily exercise their LGPD rights.
- Clearing of security logs (event logs, PowerShell logs, web server logs)
- Disabling security tools (Firewall, Defender, ETW)
- Suspicious access to PII systems used by DPO (identity stores, databases)
- Scheduled-task tampering linked to persistence
- Ransomware behavior and abnormal file modifications
- Outbound exfiltration of DSR-related evidence or documents
Security & Incident Monitoring
- Security Incident & Alert Summary Report
- Correlated Incident Timeline Report
- User Behavior Anomaly Report
- Failed Login & Brute-Force Detection Reports
Log & Data Integrity
- Log Integrity Verification Report
- Evidence Retention & Log Archival Status Report
Compliance & Change Monitoring
- DML/DDL Change Monitoring Report (for systems holding PII)
- Outbound Data Transfer Logs
- SIEM correlation to detect unauthorized access to DPO systems
- UEBA baselining for insider threats and DPO impersonation attempts
- File Integrity Monitoring to protect governance and compliance documentation
- WORM-based log retention for regulatory and legal evidence
- Alerting on suspicious outbound data transfers related to DSR evidence
- DLP controls to prevent leakage of DSR documents and personal data
- File integrity monitoring on DPO evidence repositories
- Automated ransomware detection and containment to protect logs and evidence
- Classification of sensitive data handled by the DPO
Article 46: Security measures for processing personal data
Organizations must protect personal data by applying technical and administrative safeguards that ensure confidentiality, integrity, and availability. This includes risk-based security measures such as access control, encryption, continuous monitoring, secure system design, employee training, auditing, and maintaining reliable evidence of all data-processing and security activities.
- Firewall settings modification detected
- Windows Defender Firewall disabled (Registry / PowerShell / Netsh)
- New firewall rule added or modified
- Windows Defender service disabled
- Windows Defender exclusion added (Registry or PowerShell)
- Suspicious scheduled tasks created or modified
- Deletion of critical scheduled tasks
- SafeBoot registry keys added
- New root or CA certificate installed
- Execution of suspicious Sysinternals tools
- Ransomware detection signatures triggered
- Windows backups deleted (Wbadmin)
- System registry hive backups altered
- Failed logon attempts (all types)
- Multiple account lockouts
- Privilege escalation attempts
- Lateral movement indicators
- Unusual data access or exfiltration behavior
- Cloud misconfiguration alerts (AWS / Azure / GCP)
- Event log clearing or tampering detected
- Policy change events (audit, authentication, authorization)
- Correlated alerts across endpoint, identity, and cloud sources
- SIEM-driven investigation timelines
- Evidence retention for regulatory and forensic requirements.
- File Integrity Monitoring (FIM) summary report
- Correlated security events report
- UEBA anomaly detection report
- Database DML / DDL change audit report
- Top vulnerable devices report
- Windows audit log clearance attempt report
- System and application error logs
- Policy change reports
- Privilege user reports
- Authentication failure reports
- Firewall rule change reports
- Audit log integrity check report
- Log archival and retention status report
- File access / read reports
- File modification / deletion reports
- Permission modification reports
- Sensitive data access report
- Ransomware impact and containment report
- Real-time event correlation for multi-stage attack detection
- Continuous monitoring of endpoint, server, and network events
- Tamper-proof WORM storage for secure audit logs
- Automated alerting for policy/configuration changes
- Predefined alert profiles: Malware activity, Firewall changes, Brute-force attacks, Suspicious privilege use
- Detection of system errors that may compromise security
- File Integrity Monitoring (FIM) for critical directories
- Monitoring unauthorized file changes
- Tracking firewall rule modifications
- Privilege use auditing (sensitive rights & operations)
- Cloud event auditing (AWS, Azure, GCP)
- Detection of access anomalies & misconfigurations
- Monitoring hybrid infrastructure security events
Article 48: Breach notification
Organizations must promptly detect, assess, and report any personal data breach that may pose risk or harm. Notifications to the ANPD and affected individuals must clearly describe what data was impacted, the risks involved, actions taken, and provide DPO contact details. Organizations must retain logs, audit trails, and incident evidence to support regulatory investigations and demonstrate transparency.
- Firewall Settings Modified
- Microsoft Defender Firewall Disabled (Registry / Netsh / PowerShell)
- New Firewall Rule Added
- Windows Defender Service Disabled
- Windows Defender Exclusions Added (Registry / PowerShell)
- Security Tools Disabled
- PowerShell Logging Disabled (Registry / Script)
- Macro Runtime Scan Disabled
- Security Event Log Cleared
- EventLog File Deleted
- EventLog File Location Tampering
- ETW Logging Disabled (rpcrt4.dll, SCM, .NET, PowerShell)
- ETW Trace Evasion Activity
- PowerShell Console History Logs Deleted
- Clear PowerShell History
- IIS Access Logs Deleted
- Tomcat Access Logs Deleted
- Ransomware Detections
- Backups Deleted via Wbadmin
- All Backups Wiped
- Registry Hive Backup Interference
- Security Incident Report
- Real-time Alert History
- Audit Log Integrity Check Report
- Correlated Incident Timeline Report
- DML/DDL Change Reports (database tampering)
- Log Archival & Retention Audit
- Windows Security Log Clearance Attempt Report
- Audit Policy Change Report
- Privilege Use Report
- System Error & Crash Logs (indicate breach impact)
- Firewall Rule Modification Report
- File Access / File Modification / File Deletion Reports
- Exfiltration Attempt Reports (USB, Email, Web)
- Ransomware Activity Report
- Permission Change Evidence Reports
- Enable Real-time Correlation to identify multi-stage intrusions
- Use File Integrity Monitoring to detect unauthorized file changes
- Enforce Tamper-proof Logging (WORM) for forensic evidence integrity
- Configure UBA to detect unusual access and mass file events
- Enable Real-time Alerts for privilege escalation, malware, firewall changes
- Centralize Incident Response Timelines for ANPD reporting
- Enable Real-time File Access & Modification Tracking
- Enable DLP (USB / Email / Web) to detect and prevent data exfiltration
- Enable Permission Change Auditing to identify attacker escalation
- Enable Ransomware Early Detection with automated isolation
- Monitor authentication failures and privilege use events
- Track system integrity events (policy changes, audit config changes)
- Detect log tampering and system-level evasion techniques
- Maintain real-time visibility into server, firewall, and application logs
Article 49: Secure system design
Article 49 requires that any system used to process personal data must be designed and operated according to security requirements, good practices, governance principles, and relevant regulatory standards. This means organizations must embed security from the beginning (“security by design”), maintain continuous protection (“security by default”), and ensure that every system handling personal data follows robust, verifiable, and auditable security practices.
- Windows Firewall Settings Have Been Changed
- Disable Microsoft Defender Firewall via Registry
- Firewall Disabled via Netsh.EXE
- New Firewall Rule Added Via Netsh.EXE
- Firewall IPS Signature Detected
- Windows Defender Service Disabled – Registry
- Disable Windows Defender Functionalities Via Registry Keys
- Windows Defender Exclusions Added – Registry
- Windows Defender Exclusions Added – PowerShell
- ETW Logging Disabled in .NET Processes – Sysmon Registry
- ETW Logging Disabled for rpcrt4.dll
- ETW Logging Disabled for SCM
- ETW Trace Evasion Activity
- Disable of ETW Trace – PowerShell
- PowerShell Disable Security Monitoring
- PowerShell Logging Disabled via Registry Key Tampering
- Security Eventlog Cleared
- EventLog EVTX File Deleted
- Potential EventLog File Location Tampering
- IIS WebServer Access Logs Deleted
- Tomcat WebServer Logs Deleted
- Suspicious Modification of Scheduled Tasks
- Suspicious Scheduled Tasks Created During Non-working Hours
- Delete All Scheduled Tasks
- Add SafeBoot Keys via Reg Utility
- New Root or CA or AuthRoot Certificate Installed
- PUA – Sysinternal Tool Execution – Registry
- Configuration Change Audit Report
- Correlation Rule Trigger Report
- Log Retention & Archival Report
- Firewall Policy Change Report
- System Hardening Deviation Report
- Database DML / DDL Change Audit
- File Integrity Monitoring (FIM) Change Report
- Correlation engine to detect multi-step attacks against system infrastructure
- File Integrity Monitoring for system files, configuration files, registry, and application directories
- Continuous log monitoring from servers, firewalls, AD, and applications to detect insecure modifications
- UEBA analytics to identify identity or system misuse inconsistent with secure design
- Audit-proof log immutability (WORM) meeting governance requirements
- Configuration drift detection ensuring systems remain aligned with secure baseline configurations
- Permission analytics to detect overexposure of sensitive data
- Sensitive data discovery and classification to ensure proper governance controls
- Real-time access, modification, and deletion alerts to enforce integrity protections
Article 50: Good practices and governance
Article 50 requires organizations to maintain a formal and continually updated privacy governance framework. This includes documented policies, security standards, risk-based controls, complaint handling, internal supervision, and training. Governance must reflect the nature and sensitivity of processed data and must demonstrate transparency and accountability to data subjects and the ANPD.
- Windows Firewall Settings Have Been Changed
- Disable Microsoft Defender Firewall via Registry
- Firewall Disabled via Netsh.EXE
- New Firewall Rule Added Via Netsh.EXE
- Windows Defender Service Disabled – Registry
- Disable Windows Defender Functionalities via Registry Keys
- Windows Defender Exclusions Added (Registry / PowerShell)
- PowerShell Disable Security Monitoring
- PowerShell Logging Disabled via Registry Key
- Security EventLog Cleared
- EventLog EVTX File Deleted
- EventLog File Location Tampering
- IIS WebServer Logs Deleted
- Tomcat Logs Deleted
- ETW Logging Disabled (rpcrt4.dll, SCM, .NET processes)
- ETW Trace Evasion Activity
- Suspicious Scheduled Task Modifications
- Unauthorized Task Creation in Temp Folder
- Add SafeBoot Registry Keys
- Unauthorized Root/CA Certificate Installation
- PUA – Sysinternal Tool Execution
- Ransomware Detections
- Windows Backup Deleted via Wbadmin
- All Backups Deleted
- Policy Change Audit Report
- Correlation Rule Trigger Reports
- File Integrity Monitoring (FIM) Reports
- Log Archival & Retention Compliance Reports
- Privileged User Activity Monitoring Report
- Cross-System Change Correlation Report
- Database Permission & Schema Change Reports
- UEBA Anomaly Reports
- File Access & Modification Reports
- Permission Changes & Vulnerability Reports
- Data Classification Summary (Sensitive vs Non-sensitive)
- Endpoint DLP Violations Report
- GPO/Security Policy Modification Reports
- AD Object Modification & Deletion Reports
- Privileged Group Membership Change Report
- Logon/Logoff Activity Reports
- Permission Changes for Sensitive Folders
- AD Change Summary (for governance audits)
- Delegation & Role Assignment Reports
- User Lifecycle Activity Reports (Creation, Disable, Deletion)
- Permission Analysis Reports
- Inactive Users / Stale Objects Reports
- Workflow Execution Audit Report
- MFA Enrollment Usage Report
- Password Policy Enforcement Report
- Self-Service Access History
- Implement policy-change monitoring across all systems and infrastructure
- Enforce File Integrity Monitoring for configuration files, registry, certificates, and system directories
- Use UEBA to detect deviations from established governance baselines
- Ensure log immutability (WORM) to maintain trustworthy, auditable governance evidence
- Enforce continuous correlation monitoring for unauthorized activity or system drift
- Enforce Data Classification to maintain governance based on sensitivity
- Detect permission vulnerabilities and enforce least-privilege governance
- Monitor real-time access to sensitive or regulated files
- Enforce DLP policies for email, USB, web, and printing to maintain governance obligations



