UCF STIG Viewer Logo

Auditing records are configured as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6850 4.008 SV-16967r1_rule ECAR-2 ECAR-3 Medium
Description
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, analyze compromises that have occurred as well as detect an attack that has begun or is about to begin. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Without an audit trail that provides information as to event that occurred and if it was successful or unsuccessful, it is difficult to analyze a series of events to determine the steps used by an attacker to compromise a system or network, or what exactly happened that led to a denial of service. Collecting data such as the successful and unsuccessful events is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior.
STIG Date
Win2k8 Audit 2013-06-10

Details

Check Text ( None )
None
Fix Text (F-6539r1_fix)
Configure the system to audit categories as outlined in check procedure.