Skip to content

Commit ebdd5df

Browse files
committed
re-enable all rules
1 parent 3a2c253 commit ebdd5df

File tree

1 file changed

+90
-90
lines changed

1 file changed

+90
-90
lines changed

sophos_firewall_audit/audit.py

Lines changed: 90 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -80,101 +80,101 @@ def run_audit(args, fw_obj, firewall, status_dict, local_dirname, web_dirname):
8080
logging.info(f"{firewall_name}: Begin Audit")
8181

8282
rule_list = [
83-
# {
84-
# "method": rules.eval_access_list,
85-
# "settings": audit_settings["access_acl"],
86-
# "log_msg": "Evaluate Access ACL"
87-
# },
88-
# {
89-
# "method": rules.eval_central_mgmt,
90-
# "settings": audit_settings,
91-
# "log_msg": "Evaluate Central Management"
92-
# },
93-
# {
94-
# "method": rules.eval_device_access_profile,
95-
# "settings": audit_settings["device_access_profile"],
96-
# "log_msg": "Evaluate Device Access Profiles"
97-
# },
98-
# {
99-
# "method": rules.eval_admin_services,
100-
# "settings": audit_settings["admin_services"],
101-
# "log_msg": "Evaluate WAN Zone Admin Services"
102-
# },
103-
# {
104-
# "method": rules.eval_admin_authen,
105-
# "settings": audit_settings["authen_servers"],
106-
# "log_msg": "Evaluate Authentication Servers"
107-
# },
108-
# {
109-
# "method": rules.eval_malware_protection,
110-
# "settings": audit_settings["malware_protection"],
111-
# "log_msg": "Evaluate Malware Protection Antivirus Engine"
112-
# },
113-
# {
114-
# "method": rules.eval_atp,
115-
# "settings": audit_settings["threat_protection"],
116-
# "log_msg": "Evaluate Advanced Threat Protection (ATP)"
117-
# },
118-
# {
119-
# "method": rules.eval_ips_policies,
120-
# "settings": audit_settings["ips_policies"],
121-
# "log_msg": "Evaluate IPS Policies"
122-
# },
123-
# {
124-
# "method": rules.eval_hostgroups,
125-
# "settings": audit_settings["host_groups"],
126-
# "log_msg": "Evaluate Host Groups"
127-
# },
83+
{
84+
"method": rules.eval_access_list,
85+
"settings": audit_settings["access_acl"],
86+
"log_msg": "Evaluate Access ACL"
87+
},
88+
{
89+
"method": rules.eval_central_mgmt,
90+
"settings": audit_settings,
91+
"log_msg": "Evaluate Central Management"
92+
},
93+
{
94+
"method": rules.eval_device_access_profile,
95+
"settings": audit_settings["device_access_profile"],
96+
"log_msg": "Evaluate Device Access Profiles"
97+
},
98+
{
99+
"method": rules.eval_admin_services,
100+
"settings": audit_settings["admin_services"],
101+
"log_msg": "Evaluate WAN Zone Admin Services"
102+
},
103+
{
104+
"method": rules.eval_admin_authen,
105+
"settings": audit_settings["authen_servers"],
106+
"log_msg": "Evaluate Authentication Servers"
107+
},
108+
{
109+
"method": rules.eval_malware_protection,
110+
"settings": audit_settings["malware_protection"],
111+
"log_msg": "Evaluate Malware Protection Antivirus Engine"
112+
},
113+
{
114+
"method": rules.eval_atp,
115+
"settings": audit_settings["threat_protection"],
116+
"log_msg": "Evaluate Advanced Threat Protection (ATP)"
117+
},
118+
{
119+
"method": rules.eval_ips_policies,
120+
"settings": audit_settings["ips_policies"],
121+
"log_msg": "Evaluate IPS Policies"
122+
},
123+
{
124+
"method": rules.eval_hostgroups,
125+
"settings": audit_settings["host_groups"],
126+
"log_msg": "Evaluate Host Groups"
127+
},
128128
{
129129
"method": rules.eval_syslog,
130130
"settings": audit_settings["syslog"],
131131
"log_msg": "Evaluate Syslog Settings"
132132
},
133-
# {
134-
# "method": rules.eval_notifications,
135-
# "settings": audit_settings,
136-
# "log_msg": "Evaluate Notifications Settings"
137-
# },
138-
# {
139-
# "method": rules.eval_notification_list,
140-
# "settings": audit_settings,
141-
# "log_msg": "Evaluate Notification List Settings"
142-
# },
143-
# {
144-
# "method": rules.eval_backup,
145-
# "settings": audit_settings,
146-
# "log_msg": "Evaluate Scheduled Backup Settings"
147-
# },
148-
# {
149-
# "method": rules.eval_certificate,
150-
# "settings": audit_settings,
151-
# "log_msg": "Evaluate Certificate Settings"
152-
# },
153-
# {
154-
# "method": rules.eval_loginsecurity,
155-
# "settings": audit_settings,
156-
# "log_msg": "Evaluate Login Security"
157-
# },
158-
# {
159-
# "method": rules.eval_dns_servers,
160-
# "settings": audit_settings,
161-
# "log_msg": "Evaluate DNS Servers"
162-
# },
163-
# {
164-
# "method": rules.eval_smtp_protection,
165-
# "settings": audit_settings,
166-
# "log_msg": "Evaluate SMTP Protection"
167-
# },
168-
# {
169-
# "method": rules.eval_snmpv3,
170-
# "settings": audit_settings,
171-
# "log_msg": "Evaluate SNMPv3"
172-
# },
173-
# {
174-
# "method": rules.eval_time,
175-
# "settings": audit_settings['time'],
176-
# "log_msg": "Evaluate Time Settings"
177-
# }
133+
{
134+
"method": rules.eval_notifications,
135+
"settings": audit_settings,
136+
"log_msg": "Evaluate Notifications Settings"
137+
},
138+
{
139+
"method": rules.eval_notification_list,
140+
"settings": audit_settings,
141+
"log_msg": "Evaluate Notification List Settings"
142+
},
143+
{
144+
"method": rules.eval_backup,
145+
"settings": audit_settings,
146+
"log_msg": "Evaluate Scheduled Backup Settings"
147+
},
148+
{
149+
"method": rules.eval_certificate,
150+
"settings": audit_settings,
151+
"log_msg": "Evaluate Certificate Settings"
152+
},
153+
{
154+
"method": rules.eval_loginsecurity,
155+
"settings": audit_settings,
156+
"log_msg": "Evaluate Login Security"
157+
},
158+
{
159+
"method": rules.eval_dns_servers,
160+
"settings": audit_settings,
161+
"log_msg": "Evaluate DNS Servers"
162+
},
163+
{
164+
"method": rules.eval_smtp_protection,
165+
"settings": audit_settings,
166+
"log_msg": "Evaluate SMTP Protection"
167+
},
168+
{
169+
"method": rules.eval_snmpv3,
170+
"settings": audit_settings,
171+
"log_msg": "Evaluate SNMPv3"
172+
},
173+
{
174+
"method": rules.eval_time,
175+
"settings": audit_settings['time'],
176+
"log_msg": "Evaluate Time Settings"
177+
}
178178
]
179179
for rule in rule_list:
180180
result = process_rule(rule["method"], rule["settings"], rule["log_msg"], fw_obj, status_dict)

0 commit comments

Comments
 (0)