Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34606 | SRG-NET-999999-IDPS-00215 | SV-45472r1_rule | Low |
Description |
---|
Logging network location information for each detected event provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured IDPS. In order to establish and correlate the series of events leading up to an outage or attack, it is imperative the source or object of the log record is recorded in all log records. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-42821r1_chk ) |
---|
Examine the aggregated sensor events log on the management console. View entries for several alerts. Verify the events in the logs show the location of each event (e.g., network name, network subnet, network segment, or organization). If the sensor event log records do not include the event location (e.g., network name, network subnet, network segment, or organization), this is a finding. |
Fix Text (F-38869r1_fix) |
---|
Configure the sensors to capture the location of each event (e.g., network name, network subnet, network segment, or organization). |