UCF STIG Viewer Logo

The system must not be used as a syslog server (log host) for systems external to the enclave.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN005440-ESXI5-000078 GEN005440-ESXI5-000078 GEN005440-ESXI5-000078_rule Medium
Description
Syslog messages are typically unencrypted and may contain sensitive information and are, therefore, restricted to the enclave.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN005440-ESXI5-000078_chk )
Verify that the vSphere Syslog Collector syslog host has been justified and documented with the IAO.
From the vSphere Client: Select the host and click "Configuration >> Advanced Settings >> Syslog >> Global".
Verify that the 'Syslog.global.logHost' is set to the (site-specific) syslog server hostname.

If the 'Syslog.global.logHost' is not restricted to the enclave, this is a finding.
Fix Text (F-GEN005440-ESXI5-000078_fix)
Step 1: Verify that the vSphere Syslog Collector syslog host has been configured. If not, install/enable the vSphere Syslog Collector.
Step 2: From the vSphere Client: Select the host and click "Configuration >> Advanced Settings >> Syslog >> Global".
Step 3: Set 'Syslog.global.logHost' to the syslog server hostname restricted to the enclave.