UCF STIG Viewer Logo

The system must have a host-based intrusion detection tool installed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227952 GEN006480 SV-227952r603266_rule Medium
Description
Without a host-based intrusion detection tool, there is no system-level defense when an intruder gains access to a system or network. Additionally, a host-based intrusion detection tool can provide methods to immediately lock out detected intrusion attempts.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-30114r490276_chk )
Ask the SA or IAO if a host-based intrusion detection application is loaded on the system.

Determine if the application is loaded on the system.

Procedure:
# find / -name -print



Determine if the application is active on the system.

Procedure:
# ps -ef | grep

If no host-based intrusion detection system is installed on the system, this is a finding.
Fix Text (F-30102r490277_fix)
Install a host-based intrusion detection tool.