The vCenter Server must produce audit records containing information to establish what type of events occurred.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-258907 | VCSA-80-000034 | SV-258907r960891_rule | CCI-000130 | medium |
| Description | ||||
| Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. | ||||
| STIG | Date | |||
| VMware vSphere 8.0 vCenter Security Technical Implementation Guide | 2025-06-09 | |||
Details
Check Text (C-258907r960891_chk)
From the vSphere Client, go to Host and Clusters.
Select a vCenter Server >> Configure >> Settings >> Advanced Settings.
Verify the "config.log.level" value is set to "info".
or
From a PowerCLI command prompt while connected to the vCenter server, run the following command:
Get-AdvancedSetting -Entity <vcenter server name> -Name config.log.level and verify it is set to "info".
If the "config.log.level" value is not set to "info" or does not exist, this is a finding.
Fix Text (F-62556r934378_fix)
From the vSphere Client, go to Host and Clusters.
Select a vCenter Server >> Configure >> Settings >> Advanced Settings.
Click "Edit Settings" and configure the "config.log.level" setting to "info".
or
From a PowerCLI command prompt while connected to the vCenter server, run the following command:
Get-AdvancedSetting -Entity <vcenter server name> -Name config.log.level | Set-AdvancedSetting -Value info