UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco ISE must generate a log record when the client machine fails posture assessment because required security software is missing or has been deleted.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242590 CSCO-NC-000160 SV-242590r714080_rule Medium
Description
Failing the Cisco ISE assessment means an unauthorized machine has attempted to access the secure network. Without generating log records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Log records can be generated from various components within the information system (e.g., module or policy filter).
STIG Date
Cisco ISE NAC Security Technical Implementation Guide 2021-04-14

Details

Check Text ( C-45865r714078_chk )
Verify that a log will be generated and sent when an Endpoint has a change in posture status.

From the Web Admin portal:
1. Choose Administration >> System >> Logging >> Logging Categories.
2. Verify the Posture and Client Provisioning Audit has LogCollector set as a target at a minimum.

If the Posture and Client Provisioning Audit logging category is not configured to send to the LogCollector and/or another logging target, this is a finding.
Fix Text (F-45822r714079_fix)
Configure a log to be generated and sent when an Endpoint has a change in posture status.

From the Web Admin portal:
1. Choose Administration >> System >> Logging >> Logging Categories.
2. Configure the "Posture and Client Provisioning Audit" category and the Targets field to have LogCollector selected at a minimum. (This is the default setting.) If the environment has an additional SYSLOG server, it can be selected here as well.