Back to Resources

Level Verified

Security Monitoring Policy

Created by

Level

Type

Monitor

Category

Security

Platforms
WindowsApple iOSLinux

Problem Overview

Maintaining consistent security across diverse operating systems can be a daunting challenge for IT professionals. Vulnerabilities such as disabled firewalls, unauthorized admin accounts, failed admin login attempts, or misconfigured DNS settings can leave systems exposed to attacks. This resource provides a holistic solution to monitor and secure your entire infrastructure—Windows, macOS, and Linux—through a unified policy.

Description

This cross-platform monitoring policy offers a centralized solution for detecting security vulnerabilities across Windows, macOS, and Linux systems in real-time. It ensures comprehensive oversight by monitoring critical parameters such as DNS configurations, firewall status, failed admin login attempts, and administrative user accounts on Windows; user accounts, firewall status, DNS settings, and failed admin logins on macOS; and sudo user access, SSH keys, DNS settings, failed admin logins, and firewall status on Linux. By addressing these core security components, the policy provides IT professionals with the tools needed to maintain a secure and stable infrastructure.

Designed to be effective for both workstations and servers, this policy is pre-configured and ready for immediate implementation without requiring any scripting expertise. It proactively identifies potential security concerns, including patterns of failed admin login attempts, empowering IT teams to take swift corrective action. Additionally, it can be seamlessly paired with automations to remediate issues automatically, further streamlining the process and reducing the risk of human error.

Preview

Security Monitoring Policy Preview

Use Cases

  • IT Teams: Monitor and secure endpoints and servers globally with minimal setup.
  • MSPs: Standardize security practices for clients with varying infrastructure.
  • Incident Response: Quickly detect and act on anomalies, such as unexpected admin accounts or disabled firewalls.
  • Compliance: Ensure firewall and account configurations align with organizational or regulatory standards.

Recommendations

  • Testing: Begin with a test group of devices (workstations and servers) before applying globally.
  • Pairing: Combine with automations for auto-remediation, e.g., enabling firewalls or removing rogue admin accounts.
  • Configuration: Customize thresholds and severity levels to align with your organizational policies.
  • Monitoring Tags: Use workstation and server tags to target the appropriate devices.
  • Documentation: Keep a record of changes made by the policy for auditing purposes.

FAQ

  • What happens if a policy flags an issue?
    Depending on your configuration, flagged issues can trigger alerts or paired automations to remediate them automatically.
  • Can I customize the thresholds and settings?
    Yes, you can adjust thresholds (e.g., frequency or duration) to suit your infrastructure.
  • How do I ensure this policy doesn’t conflict with existing configurations?
    Apply the policy to a test group first and review alerts to ensure compatibility with your current setup.
  • Is any scripting required?
    No, this resource is fully configured for immediate use—no coding needed.
  • Can this work with other Level automations?
    Absolutely! Pair it with automations to fix issues like enabling firewalls or removing unauthorized users.

Included with this Monitor:

Below is a list of what you can expect to find when importing this Monitor.

Script details:

The following data and settings will be imported with your script.

Monitors

  • Run script

Scripts

  • Windows Firewall
  • Windows Failed Admin Login
  • Windows DNS
  • Windows Admin Users
  • macOS Firewall
  • macOS DNS
  • macOS Admin Users
  • Linux Firewall
  • Linux DNS
  • Linux Admin Users
  • Linus SSH Keys

Custom Fields

  • DNS
  • Authorized Admins

Tags

  • Server
  • Workstation
Import into Level

Related resources

Explore more automations, scripts, and policies to further enhance your IT operations.

View all resources