UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The vCenter Server for Windows must produce audit records containing information to establish what type of events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216858 VCWN-65-000036 SV-216858r612237_rule Low
Description
Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.
STIG Date
VMW vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide 2020-12-10

Details

Check Text ( C-18089r366288_chk )
From the vSphere Web Client go to Host and Clusters >> Select a vCenter Server >> Configure >> Settings >> Advanced Settings. Verify that "config.log.level" value is set to "info".

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:
Get-AdvancedSetting -Entity -Name config.log.level and verify it is set to "info".

If the "config.log.level" value is not set to "info" or does not exist, this is a finding.
Fix Text (F-18087r366289_fix)
From the vSphere Web Client go to Host and Clusters >> Select a vCenter Server >> Configure >> Settings >> Advanced Settings. Click "Edit" and edit the "config.log.level" setting to "info" or if the value does not exist create it by entering the values in the "Key" and "Value" fields and clicking "Add".

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:

If the setting already exists:
Get-AdvancedSetting -Entity -Name config.log.level | Set-AdvancedSetting -Value info

If the setting does not exist:
New-AdvancedSetting -Entity -Name config.log.level -Value info