UCF STIG Viewer Logo

The organization must interconnect and configure individual intrusion detection tools into a system-wide intrusion detection system using common protocols.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28920 SRG-OS-NA SV-36911r1_rule Medium
Description
This requirement concerns network connection of devices and is not applicable to operating systems.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None