UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Forescout must generate log records for a locally developed list of auditable events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-230955 FORE-NM-000280 SV-230955r961863_rule Medium
Description
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.
STIG Date
Forescout Network Device Management Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-33885r603704_chk )
Verify the syslog triggers are configured in accordance with SSP requirements.

1. Log on to Forescout Administrator UI with admin or operator credentials.
2. From the menu, select Tools >> Options >> Modules >> Syslog >> Syslog Triggers.
3. Ensure the proper NAC events and System Logs and Events are selected in compliance with the SSP.

If Forescout does not generate log records for a locally developed list of auditable events, this is a finding.
Fix Text (F-33858r603705_fix)
Configure Forescout auditing messages to ensure auditing is comprehensible for monitoring and analysis.

1. Log on to Forescout Administrator UI with admin or operator credentials.
2. From the menu, select Tools >> Options >> Modules >> Syslog >> Syslog Triggers.
3. Ensure the proper NAC events and System Logs and Events are selected.