How can ManageEngine support PNCiber compliance?
With ManageEngine Log360, organizations can begin aligning with PNCiber principles through centralized identity governance, multi-factor authentication, continuous monitoring of access to personal data, real-time threat detection, and comprehensive audit trails to support regulatory and audit requirements.
Art. 2.II The guarantee of fundamental rights, in particular freedom of expression, personal data protection, privacy protection, and access to information.
Ensure people can speak freely, keep their personal data and privacy safe, and still get the information they need. In practice, cybersecurity measures cannot be used as an excuse to spy on people or block access to information without good legal reason.
- File Monitoring Overview
- File Monitoring Trend
- Folder Permission Changes
- System File Changes
- Top FileType Changes
- All File or Folder Changes (Removable Storage/USB)
- Host Based Removable Disk Changes
- Installation Forbidden By GPO
- Network Share Object Permission Added
- Network Share Overview
- Network Share Permission Deleted
- Top network share modifications by remote host
- User wise top failed network shares
- User wise top successful Network Shares
- AD Object WriteDAC Access
- File or Folder Permissions Modifications
- Sensitive Label Events
- All S3 Requests
- Created or Modified Files
- Symantec DLP Reports Overview
- Mailbox Folder Permission Changes
- Mailbox Permission Changes
- SendAs Permission Changes
- File Deleted Via Sysinternals SDelete
- EventLog EVTX File Deleted
- Greedy File Deletion Using Del
- Windows Backup Deleted Via Wbadmin.EXE]
- Potential EventLog File Location Tampering
- USB and network share monitoring
- File integrity monitoring
- Access auditing
Art. 2.III The prevention of incidents and cyberattacks, especially those targeting national critical infrastructures and essential services provided to society
Focus on protecting critical infrastructure such as defense systems or government intelligence and the most important services people rely on every day, such as electricity, hospitals, banking, transport, and communication systems from cyberattacks.
- All Breach Data
- Botnet Leak Data
- Dark Web Breach Data
- Supply Chain Breach
- Disabled IE Security Features
- Disabling Windows Event Auditing
- Ke3chang Registry Key Modifications
- Suspicious Driver Loaded By User
- Weak Encryption Enabled and Kerberoast
- Windows Defender Exclusion Set
- Windows Defender Threat Detection Disabled
- Commercial Application detected Reports
- HIPS Activity Reports
- Policy Changes
- Port Scan Reports
- Security Risk Found Reports
- Virus Report
- Top Signature
- Top Traffic based on Severity
- Allowed Exploits
- Allowed Threats
- Blocked Exploits
- Detected Exploits
- Threats Detection by Sophos Anti-Virus
- Threats Detections by ESET Endpoint Antivirus
- Threats Detections by Kaspersky
- Downgrade Attacks
- IP Conflicts
- Replay Attack
- Terminal Server Attacks
- Terminal Server Exceeds Maximum Logon Attempts
- Bad HostConfig Errors
- Bad ISP Errors
- DoS Attack
- Invalid connection Remote Host
- Reverse Lookup Errors
- Notable Account Lockouts
- Excessive password change failure
- Login to Disabled Account
- Suspicious Successful Password Change Activity
- Kerbrute detection
- HackTool - Mimikatz Kirbi File Creation
- Real-time brute-force detection (failed logon reports and Kerbrute rules)
- Kerberos attack monitoring (TGT ticket requests)
- Over 400 threat rules for threat detection
Art. 2.IV The resilience of public and private organizations to incidents and cyberattacks
Eusure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.
- AD Backup Error
- Active Directory database corruptions
- Chassis Module Status
- Code Integrity Check
- Fan Off
- Fan Failed
- Firewall Service Stopped
- GPO Queries - Failed
- HA Status
- Hardisk failures
- Interface Down Suspended by Speed
- Interface Status
- Licence Expired
- Logs Deleted
- Process Restart
- Process Restart Failed
- Processes Killed by Host
- Sensor Status
- System Shutdown due to Temperature
- System Start
- Voltage Out of Tolerance
- Yum installs
- Audit Events Dropped
- Security Logs Cleared
- SceCli Group Policy
- User Account Changes
- HTTP Status Success
- HTTP Unauthorized
- Site Access Denied
- Status Code Summary
- Success Reports
- UNC Authorization Failed
- Web Server Busy
- Write Access Forbidden
- Risk Level
- BOOTP Lease Report
- Server found in domain
- Top Clients
- Top Gateway
- Top IP Address
- Top MAC Address
- Top Operation
- Unreachable domain
- Warning Reports
- Security Eventlog Cleared
- Suspicious Eventlog Clearing or Configuration Change Activity
- Potential EventLog File Location Tampering
- EventLog EVTXFile Deleted
- Log protection
- Backup monitoring
- Evidence preservation
- Over 400 threat rules for threat detection
Art. 3.II To ensure the confidentiality, integrity, authenticity, and availability of solutions and data used for the electronic or digital processing, storage, and transmission of information
Ensure that only the right people can see and change important data, that the data is genuine and hasn’t been tampered with, and that it’s always available when needed. In simple terms, it’s about keeping your systems and information safe, accurate, and reliably accessible at all times.
- Successful user disconnections from the resource based on administrators
- Failed VPN Logons
- Top Failed VPN Logons based on Group
- VPN Unlocks
- Account Management Event
- Failed user additions
- Added Members to Groups
- User Accounts Created With no password expiry
- Alter System
- Altered profiles
- System Revoke
- Blocked Processes Report
- Column Modified Reports
- Connected Applications Report
- Index Information Report
- Last Backup of Database
- Last DBCC Activity
- Most Used Tables
- Object Change History
- Security Changes Report
- Server Information Report
- Table Update Report
- Waits Information Report
- Client wise top successful DC credential validations
- DC Credential Validation Failure due to Bad Password
- Kerberos authentication ticket (TGT) - Requested
- UnSuccessful Post Authentication
- User wise top failure DC credential validations
- RADIUS Logon History(NPS)
- Remote Desktop Gateway
- SSH logons
- SU Logons
- User Logons
- Web Logons
- Firewall Flood Attack
- Firewall SYN Attack
- Windows Firewall Rule Added
- Windows Firewall Rule Deleted
- Windows Firewall Rule Modified
- Windows Firewall Settings Changed
- Windows Firewall Settings Restored
- Suspicious Modification Of Scheduled Tasks
- Potential Tampering With Security Products Via WMIC
- System Disk And Volume Reconnaissance Via Wmic.EXE
- Potential DLL Sideloading Via comctl32.dll
- File integrity monitoring (for files created, modified, or deleted)
- Real-time AD auditing (of user, group, GPO, and computer changes)
- Registry change tracking
- Database activity anomaly detection
- Windows backup monitoring
- Defence evasion monitoring
- Ransomware detection and containment
- Configuration change tracking
Art. 3.IV To contribute to the fight against cybercrime and other malicious activities in cyberspace
Helping police, governments, and companies spot, stop, and investigate cyber crimes like hacking, fraud, data theft, and more. It also means sharing information and tools so everyone can work together to make the online world safer and more difficultfor criminals to operate in.
- Hacktool Ruler
- NTLM Logon
- Pass the Hash Activity
- Pass the Hash Activity 2
- Successful Overpass the Hash Attempt
- Reconnaissance Activity
- Judgement Panda Credential Access Activity
- Local User Creation
- Net.exe User Account Creation
- Suspicious Windows ANONYMOUS LOGON Local Account Created
- Account Tampering - Suspicious Failed Logon Reasons
- Admin User Remote Logon
- Enabled User Right in AD to Control User Objects
- Failed Logon From Public IP
- Active Directory User Backdoors
- Judgement Panda Exfil Activity
- Addition of SID History to Active Directory Object
- AD Privileged Users or Groups Reconnaissance
- AD User Enumeration
- Bloodhound and Sharphound Hack Tool
- Hacktool Ruler
- Malicious Service Installations
- Mimikatz Command Line
- Mimikatz DC Sync
- Mimikatz Use
- NotPetya Ransomware Activity
- WCE wceaux.dll Access
- Hurricane Panda Activity
- Local Privilege Escalation via WER service
- Possible LocalPotato Execution
- MITRE technique and TTP detection
- Credential dumping and privilege-escalation detection
- Anomalous behavior and reconnaissance detection
Art. 3.V To encourage the adoption of cyber protection and risk management measures to prevent, avoid, mitigate, reduce, and neutralize vulnerabilities, incidents, and cyberattacks and their impacts
Helping organizations actually put in place security tools and routines so they can find and fix weaknesses before attackers use them. It also means reducing the damage when attacks do happen, so incidents are contained quickly and have as little impact as possible.
- Open Ports
- Top Vulnerable OS
- Top Vulnerable Service
- Critical Threat Reports
- Exploited Vulnerability
- High Threat Reports
- OpenVas Reports Overview
- NMAP Reports Overview
- NMAP-Filtered Ports
- Top CVS Score by Count
- Top Open Ports
- Vulnerability Reports Overview
- Admin Discovery Report
- Credential Failures Report
- Elevated Privilege Failures Report
- GHOST in Linux
- Shellshock Report
- Confirmed vulnerabilities
- Information gathered vulnerabilities
- Open TCP Ports
- Open UDP Ports
- Operating System Detected
- Potential vulnerabilities
- Qualys Reports Overview
- Services vulnerabilities
- Severe Vulnerabilities
- MBR Tampering Via Bcdedit.EXE
- DNS Exfiltration and Tunneling Tools Execution
- Windows Defender Exclusions Added - Registry
- Disable Microsoft Defender Firewall via Registry
- Firewall Disabled via Netsh.EXE
- Vulnerability scanning
- Ransomware detection
- Defence evasion
- Policy-change monitoring
Art. 3.VI To enhance the resilience of public and private organizations to incidents and cyberattacks
Ensure both public and private organizations are aware and prepared to face cyber incidents by taking proactive actions. These can range from installing basic firewalls to advanced SIEM and IAM solutions for continuous monitoring and detection.
- Database Backup Failed
- Database Restore
- Modification of Boot Configuration
- Shadow Copies Deletion Using Operating Systems Utilities
- Failed Windows backup
- Failed Windows restores
- Successful Windows restores
- Successful windows backup
- System Restored
- Audit Sessions Changed
- Audit Shutdown on Failure
- Database Audit Specifications Altered
- Database Audit Specifications Created
- Database Audit Specifications Dropped
- Server Audit Specifications Altered
- Registry Created
- Registry Deleted
- Registry Permission Changes
- Registry Value Modified
- Top Users on Registry
- Audit Policy (SACL) on Object Changes
- Authentication Policy Change(Grant)
- Authentication Policy Change(Revoke)
- Domain Policy Changes
- Per User Audit Policy Changes
- Policy Added
- Policy Deleted
- GPO Created
- GPO Deleted
- GPO Modified
- External Disk Drive or USB Storage Device
- Active Directory Computers Enumeration With Get-AdComputer
- Local Accounts Discovery
- LSASS Process Memory Dump Files
- Excessive Inbound or Outbound Connections from same Source
- Brute Force Login Violation
- Botnet Detection
- Reconnaissance detection
- Incident management
- Lateral movement detection
Art. 3.X To develop regulatory, oversight, and control mechanisms aimed at improving national cybersecurity and resilience
Create rules, monitoring systems, and checks that help make Brazil's digital infrastructure stronger and more secure against cyber threats. In simple terms, it focuses on building oversight tools and controls to continuously improve how the country detects, responds to, and recovers from cyberattacks.
- Removed Applications
- Updated Applications
- Cisco IOS Compliance Checks
- Citrix XenServer Compliance Checks
- Database Compliance Checks
- Huawei Compliance Checks
- IBM iSeries Compliance Checks
- PCI DSS Compliance: Database Reachable from the Internet
- PCI DSS Compliance: Handling False Positives
- PCI DSS Compliance: Insecure Communication Has Been Detected
- PCI DSS Compliance: Remote Access Software Has Been Detected
- PCI DSS Compliance:Passed
- PCI DSS Compliance:Tests Requirements
- PCI DSS compliance
- SonicWALL SonicOS Compliance Checks
- Unix Compliance Checks
- Unix File Contents Compliance Checks
- VMware vCenter/vSphere Compliance Checks
- Windows Compliance Checks
- Windows File Contents Compliance Checks
Compliance oversight and control dashboards
Art. 6.III CNCiber Responsibility: Formulating proposals to improve the prevention, detection, analysis, and response to cyber incidents.
CNCiber's responsibility is to suggest practical improvements for better preventing cyber attacks, spotting them early, investigating what happened, and responding effectively to minimize damage. In simple terms, they recommend ways to make organizations stronger at stopping threats before they strike and handling incidents quickly when they do occur.
- Logon Scripts (UserInitMprLogonScript)
- Failed Logons
- Failed Logons Trend
- Top Failure Logons based on Remote Devices
- Top failure logons based on users
- Failed VPN Logons
- Top Failed VPN Logons based on Remote Device
- Top Failed VPN Logons based on Source
- Top Failed VPN Logons based on User
- VPN Failed Logon Trend Reports
- Computer Account Created
- Computer Account Deleted
- Computer Account Modified
- All User Management Activities
- MFA Reset Activity
- Other User Activities
- Password Policy Modifications
- Recent Password Change Activities
- Recent Password Changes Through Self Service
- Recent Password Reset Activities
- Role Changes
- Successful Logons
- User Account Modifications
- Direct Autorun Keys Modification
- Kerberos Manipulation
- NetNTLM Downgrade Attack
- Firewall IPS Signature Detected
- Sign-in Brute Force against M365 Accounts
- Generic Attacks Detection
- External Threat
- Malicious URL Detection
- Virus detected
- Suspicious Eventlog Clearing or Configuration Change Activity
- Incident management and SOAR automation
- Forensic analysis and before/after comparisons
- Cloud threat detection
Disclaimer: The information provided on this page is for general knowledge and awareness purposes only. It is not intended to serve as professional, legal, or regulatory advice. Compliance with PNCiber depends on your organization’s specific environment, processes, and risk profile.
To accurately assess your compliance posture, we strongly recommend engaging a qualified consultant, compliance agency, or referring directly to the official PNCiber documentation and guidelines.



