Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-6850 | 4.008 | SV-16967r1_rule | ECAR-2 ECAR-3 | Medium |
Description |
---|
Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, analyze compromises that have occurred as well as detect an attack that has begun or is about to begin. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Without an audit trail that provides information as to event that occurred and if it was successful or unsuccessful, it is difficult to analyze a series of events to determine the steps used by an attacker to compromise a system or network, or what exactly happened that led to a denial of service. Collecting data such as the successful and unsuccessful events is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. |
STIG | Date |
---|---|
Win2k8 Audit | 2013-06-10 |
Check Text ( None ) |
---|
None |
Fix Text (F-6539r1_fix) |
---|
Configure the system to audit categories as outlined in check procedure. |