UCF STIG Viewer Logo

The Central Log Server must be configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81141 SRG-APP-000354-AU-000080 SV-95855r1_rule Low
Description
If the system is not configured to select a user session to capture and view or produce a report, investigations into suspicious or harmful events would be hampered by the volume of information captured. The volume of information captured may also adversely impact the operation for the network. This only includes auditable events. The Central Log Server (i.e., SIEM, syslog server) should be able to correlate across multiple devices and hosts within its span of control to provide an aggregated view of the single user's activity.
STIG Date
Central Log Server Security Requirements Guide 2020-06-22

Details

Check Text ( C-80801r1_chk )
Examine the configuration.

Verify the system is configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users.

If the Central Log Server is not configured to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users, this is a finding.
Fix Text (F-87915r1_fix)
Configure the Central Log Server to allow selection, capture, and view of all events related to a user session, host, or device when required by authorized users.