UCF STIG Viewer Logo

The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-256072 RINP-DM-000004 SV-256072r882724_rule High
Description
Auditing can be disabled in the NetProfiler. The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. Upon gaining access to a network device, an attacker often attempts to create or change accounts to ensure continued access. Audit records and alerts with sufficient information to provide the information system security officer (ISSO) with forensic information about the incident can alert administrators to an ongoing attack attempt. The Riverbed NetProfiler audit log generates sufficient information by default to fulfill DOD requirements when the audit setting "Log all Audit Events" is selected. Sites may also fine-tune using the "Log custom set of audit events" and selecting applicable settings; however, this method may fail to capture all required audit records. Satisfies: SRG-APP-000026-NDM-000208, SRG-APP-000516-NDM-000350, SRG-APP-000027-NDM-000209, SRG-APP-000028-NDM-000210, SRG-APP-000029-NDM-000211, SRG-APP-000092-NDM-000224, SRG-APP-000095-NDM-000225, SRG-APP-000096-NDM-000226, SRG-APP-000097-NDM-000227, SRG-APP-000098-NDM-000228, SRG-APP-000099-NDM-000229, SRG-APP-000100-NDM-000230, SRG-APP-000101-NDM-000231, SRG-APP-000381-NDM-000305, SRG-APP-000080-NDM-000220, SRG-APP-000091-NDM-000223, SRG-APP-000343-NDM-000289, SRG-APP-000495-NDM-000318, SRG-APP-000499-NDM-000319, SRG-APP-000503-NDM-000320, SRG-APP-000504-NDM-000321
STIG Date
Riverbed NetProfiler Security Technical Implementation Guide 2023-01-11

Details

Check Text ( C-59746r882722_chk )
Enable all DOD-required audit requirements, including changes to user accounts and use of privileged functions.

Go to Administration >> Audit Trail.

Click "Audit Settings".

Check under "Logging Settings".

If "Log all Audit Events" is not selected, this is a finding.
Fix Text (F-59689r882723_fix)
Go to Administration >> Audit Trail.

Click "Audit Settings".

Under "Logging Settings", select "Log all Audit Events".

Click "OK" to save the settings.