UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251788 TNDM-3X-000090 SV-251788r879887_rule Medium
Description
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.
STIG Date
VMware NSX-T Manager NDM Security Technical Implementation Guide 2023-06-22

Details

Check Text ( C-55248r810365_chk )
From an NSX-T Manager shell, run the following command(s):

> get service async_replicator | find Logging
> get service http | find Logging
> get service manager | find Logging
> get service policy | find Logging

Expected result:
Logging level: info

If the output does not match the expected result, this is a finding.
Fix Text (F-55202r810366_fix)
From an NSX-T Manager shell, run the following command(s):

> set service async_replicator logging-level info
> set service http logging-level info
> set service manager logging-level info
> set service policy logging-level info