UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must provide the capability to filter audit records for events of interest based upon all audit fields within audit records.


Overview

Finding ID Version Rule ID IA Controls Severity
V-203614 SRG-OS-000054-GPOS-00025 SV-203614r557100_rule Medium
Description
The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability to quickly isolate and identify these events without having to review entries that are of little or no consequence to the investigation. Without this capability, forensic investigations are impeded. Events of interest can be identified by the content of specific audit record fields, including, for example, identities of individuals, event types, event locations, event times, event dates, system resources involved, IP addresses involved, or information objects accessed. Organizations may define audit event criteria to any degree of granularity required, for example, locations selectable by general networking location (e.g., by network or subnetwork) or selectable by specific information system component. This requires operating systems to provide the capability to customize audit record reports based on all available criteria.
STIG Date
General Purpose Operating System Security Requirements Guide 2023-12-01

Details

Check Text ( C-3739r557098_chk )
Verify the operating system provides the capability to filter audit records for events of interest based upon all audit fields within audit records. If it does not, this is a finding.
Fix Text (F-3739r557099_fix)
Configure the operating system to provide the capability to filter audit records for events of interest based upon all audit fields within audit records.