UCF STIG Viewer Logo

The IDPS must produce sensor event log records containing sufficient information to establish where the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34606 SRG-NET-999999-IDPS-00215 SV-45472r1_rule Low
Description
Logging network location information for each detected event provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured IDPS. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the source or object of the log record is recorded in all log records.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42821r1_chk )
Examine the aggregated sensor events log on the management console.
View entries for several alerts.
Verify the events in the logs show the location of each event (e.g., network name, network subnet, network segment, or organization).

If the sensor event log records do not include the event location (e.g., network name, network subnet, network segment, or organization), this is a finding.
Fix Text (F-38869r1_fix)
Configure the sensors to capture the location of each event (e.g., network name, network subnet, network segment, or organization).