UCF STIG Viewer Logo

The NSX-T Manager must generate log records for the info level to capture the DoD-required auditable events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251788 TNDM-3X-000090 SV-251788r810367_rule Medium
Description
Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.
STIG Date
VMware NSX-T Manager NDM Security Technical Implementation Guide 2022-09-01

Details

Check Text ( C-55248r810365_chk )
From an NSX-T Manager shell, run the following command(s):

> get service async_replicator | find Logging
> get service http | find Logging
> get service manager | find Logging
> get service policy | find Logging

Expected result:
Logging level: info

If the output does not match the expected result, this is a finding.
Fix Text (F-55202r810366_fix)
From an NSX-T Manager shell, run the following command(s):

> set service async_replicator logging-level info
> set service http logging-level info
> set service manager logging-level info
> set service policy logging-level info