The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-251788 | SRG-APP-000516-NDM-000334 | TNDM-3X-000090 | SV-251788r879887_rule | 2023-06-22 | 1 |
Description |
---|
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis. |
ℹ️ Check |
---|
From an NSX-T Manager shell, run the following command(s): > get service async_replicator | find Logging > get service http | find Logging > get service manager | find Logging > get service policy | find Logging Expected result: Logging level: info If the output does not match the expected result, this is a finding. |
✔️ Fix |
---|
From an NSX-T Manager shell, run the following command(s): > set service async_replicator logging-level info > set service http logging-level info > set service manager logging-level info > set service policy logging-level info |