UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Central Log Server must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.


Overview

Finding ID Version Rule ID IA Controls Severity
V-206449 SRG-APP-000086-AU-000020 SV-206449r395700_rule Low
Description
If the application is not configured to collate records based on the time when the events occurred, the ability to perform forensic analysis and investigations across multiple components is significantly degraded. Centralized log aggregation must also include logs from databases and servers (e.g., Windows) that do not natively send logs using the syslog protocol.
STIG Date
Central Log Server Security Requirements Guide 2022-09-14

Details

Check Text ( C-6709r285591_chk )
Examine the documentation that lists the scope of coverage for the specific log server being reviewed.

Verify the system is configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.

If the Central Log Server is not configured to aggregate log records from organization-defined devices and hosts within its scope of coverage, this is a finding.
Fix Text (F-6709r285592_fix)
For each log server, configure the server to aggregate log records from organization-defined devices and hosts within its scope of coverage.