UCF STIG Viewer Logo

The system must use a remote syslog server (loghost).


Overview

Finding ID Version Rule ID IA Controls Severity
V-22455 GEN005450 SV-37811r2_rule ECAT-1 Medium
Description
A syslog server (loghost) receives syslog messages from one or more systems. This data can be used as an authoritative log source in the event a system is compromised and its local logs are suspect.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-09-03

Details

Check Text ( None )
None
Fix Text (F-32277r2_fix)
Edit the syslog or rsyslog configuration file and add an appropriate remote syslog server.