UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use a remote syslog server (loghost).


Overview

Finding ID Version Rule ID IA Controls Severity
V-22455 GEN005450 SV-37811r2_rule ECAT-1 Medium
Description
A syslog server (loghost) receives syslog messages from one or more systems. This data can be used as an authoritative log source in the event a system is compromised and its local logs are suspect.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-09-03

Details

Check Text ( None )
None
Fix Text (F-32277r2_fix)
Edit the syslog or rsyslog configuration file and add an appropriate remote syslog server.