@@ -80,101 +80,101 @@ def run_audit(args, fw_obj, firewall, status_dict, local_dirname, web_dirname):
8080 logging .info (f"{ firewall_name } : Begin Audit" )
8181
8282 rule_list = [
83- # {
84- # "method": rules.eval_access_list,
85- # "settings": audit_settings["access_acl"],
86- # "log_msg": "Evaluate Access ACL"
87- # },
88- # {
89- # "method": rules.eval_central_mgmt,
90- # "settings": audit_settings,
91- # "log_msg": "Evaluate Central Management"
92- # },
93- # {
94- # "method": rules.eval_device_access_profile,
95- # "settings": audit_settings["device_access_profile"],
96- # "log_msg": "Evaluate Device Access Profiles"
97- # },
98- # {
99- # "method": rules.eval_admin_services,
100- # "settings": audit_settings["admin_services"],
101- # "log_msg": "Evaluate WAN Zone Admin Services"
102- # },
103- # {
104- # "method": rules.eval_admin_authen,
105- # "settings": audit_settings["authen_servers"],
106- # "log_msg": "Evaluate Authentication Servers"
107- # },
108- # {
109- # "method": rules.eval_malware_protection,
110- # "settings": audit_settings["malware_protection"],
111- # "log_msg": "Evaluate Malware Protection Antivirus Engine"
112- # },
113- # {
114- # "method": rules.eval_atp,
115- # "settings": audit_settings["threat_protection"],
116- # "log_msg": "Evaluate Advanced Threat Protection (ATP)"
117- # },
118- # {
119- # "method": rules.eval_ips_policies,
120- # "settings": audit_settings["ips_policies"],
121- # "log_msg": "Evaluate IPS Policies"
122- # },
123- # {
124- # "method": rules.eval_hostgroups,
125- # "settings": audit_settings["host_groups"],
126- # "log_msg": "Evaluate Host Groups"
127- # },
83+ {
84+ "method" : rules .eval_access_list ,
85+ "settings" : audit_settings ["access_acl" ],
86+ "log_msg" : "Evaluate Access ACL"
87+ },
88+ {
89+ "method" : rules .eval_central_mgmt ,
90+ "settings" : audit_settings ,
91+ "log_msg" : "Evaluate Central Management"
92+ },
93+ {
94+ "method" : rules .eval_device_access_profile ,
95+ "settings" : audit_settings ["device_access_profile" ],
96+ "log_msg" : "Evaluate Device Access Profiles"
97+ },
98+ {
99+ "method" : rules .eval_admin_services ,
100+ "settings" : audit_settings ["admin_services" ],
101+ "log_msg" : "Evaluate WAN Zone Admin Services"
102+ },
103+ {
104+ "method" : rules .eval_admin_authen ,
105+ "settings" : audit_settings ["authen_servers" ],
106+ "log_msg" : "Evaluate Authentication Servers"
107+ },
108+ {
109+ "method" : rules .eval_malware_protection ,
110+ "settings" : audit_settings ["malware_protection" ],
111+ "log_msg" : "Evaluate Malware Protection Antivirus Engine"
112+ },
113+ {
114+ "method" : rules .eval_atp ,
115+ "settings" : audit_settings ["threat_protection" ],
116+ "log_msg" : "Evaluate Advanced Threat Protection (ATP)"
117+ },
118+ {
119+ "method" : rules .eval_ips_policies ,
120+ "settings" : audit_settings ["ips_policies" ],
121+ "log_msg" : "Evaluate IPS Policies"
122+ },
123+ {
124+ "method" : rules .eval_hostgroups ,
125+ "settings" : audit_settings ["host_groups" ],
126+ "log_msg" : "Evaluate Host Groups"
127+ },
128128 {
129129 "method" : rules .eval_syslog ,
130130 "settings" : audit_settings ["syslog" ],
131131 "log_msg" : "Evaluate Syslog Settings"
132132 },
133- # {
134- # "method": rules.eval_notifications,
135- # "settings": audit_settings,
136- # "log_msg": "Evaluate Notifications Settings"
137- # },
138- # {
139- # "method": rules.eval_notification_list,
140- # "settings": audit_settings,
141- # "log_msg": "Evaluate Notification List Settings"
142- # },
143- # {
144- # "method": rules.eval_backup,
145- # "settings": audit_settings,
146- # "log_msg": "Evaluate Scheduled Backup Settings"
147- # },
148- # {
149- # "method": rules.eval_certificate,
150- # "settings": audit_settings,
151- # "log_msg": "Evaluate Certificate Settings"
152- # },
153- # {
154- # "method": rules.eval_loginsecurity,
155- # "settings": audit_settings,
156- # "log_msg": "Evaluate Login Security"
157- # },
158- # {
159- # "method": rules.eval_dns_servers,
160- # "settings": audit_settings,
161- # "log_msg": "Evaluate DNS Servers"
162- # },
163- # {
164- # "method": rules.eval_smtp_protection,
165- # "settings": audit_settings,
166- # "log_msg": "Evaluate SMTP Protection"
167- # },
168- # {
169- # "method": rules.eval_snmpv3,
170- # "settings": audit_settings,
171- # "log_msg": "Evaluate SNMPv3"
172- # },
173- # {
174- # "method": rules.eval_time,
175- # "settings": audit_settings['time'],
176- # "log_msg": "Evaluate Time Settings"
177- # }
133+ {
134+ "method" : rules .eval_notifications ,
135+ "settings" : audit_settings ,
136+ "log_msg" : "Evaluate Notifications Settings"
137+ },
138+ {
139+ "method" : rules .eval_notification_list ,
140+ "settings" : audit_settings ,
141+ "log_msg" : "Evaluate Notification List Settings"
142+ },
143+ {
144+ "method" : rules .eval_backup ,
145+ "settings" : audit_settings ,
146+ "log_msg" : "Evaluate Scheduled Backup Settings"
147+ },
148+ {
149+ "method" : rules .eval_certificate ,
150+ "settings" : audit_settings ,
151+ "log_msg" : "Evaluate Certificate Settings"
152+ },
153+ {
154+ "method" : rules .eval_loginsecurity ,
155+ "settings" : audit_settings ,
156+ "log_msg" : "Evaluate Login Security"
157+ },
158+ {
159+ "method" : rules .eval_dns_servers ,
160+ "settings" : audit_settings ,
161+ "log_msg" : "Evaluate DNS Servers"
162+ },
163+ {
164+ "method" : rules .eval_smtp_protection ,
165+ "settings" : audit_settings ,
166+ "log_msg" : "Evaluate SMTP Protection"
167+ },
168+ {
169+ "method" : rules .eval_snmpv3 ,
170+ "settings" : audit_settings ,
171+ "log_msg" : "Evaluate SNMPv3"
172+ },
173+ {
174+ "method" : rules .eval_time ,
175+ "settings" : audit_settings ['time' ],
176+ "log_msg" : "Evaluate Time Settings"
177+ }
178178 ]
179179 for rule in rule_list :
180180 result = process_rule (rule ["method" ], rule ["settings" ], rule ["log_msg" ], fw_obj , status_dict )
0 commit comments