UCF STIG Viewer Logo

The UEM server must be configured to produce audit records containing information to establish when (date and time) the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234329 SRG-APP-000096-UEM-000056 SV-234329r617355_rule Medium
Description
Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment, and provide forensic analysis, it is essential for security personnel to know when events occurred (date and time). Associating event types with detected events in the application and audit logs provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application. Satisfies:FAU_GEN.1.2(1) Reference:PP-MDM-412060
STIG Date
Unified Endpoint Management Server Security Requirements Guide 2020-12-14

Details

Check Text ( C-37514r613997_chk )
Verify the UEM server produces audit records containing information to establish when (date and time) the events occurred.

If the UEM server does not produce audit records containing information to establish when (date and time) the events occurred, this is a finding.
Fix Text (F-37479r613998_fix)
Configure the UEM server to be configured to produce audit records containing information to establish when (date and time) the events occurred.