STIGQter STIGQter: STIG Summary: Palo Alto Networks ALG Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Palo Alto Networks security platform must log violations of security policies.

DISA Rule

SV-228836r557387_rule

Vulnerability Number

V-228836

Group Title

SRG-NET-000077-ALG-000046

Rule Version

PANW-AG-000024

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Go to Policies >> Security
Select "Add" to create a new security policy or select the name of the security policy to edit it.
Configure the specific parameters of the policy by completing the required information in the fields of each tab.
In the "Actions" tab, select "Log At Session End". This generates a traffic log entry for the end of a session and logs drop and deny entries.

Note: Traffic and Security Logs are required to be forwarded to syslog servers.

In the "Log Forwarding" field, select a configured log forwarding profile.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Check Contents

Go to Policies >> Security
View the configured security policies.

For any Security Policy where the "Action" column shows "deny", view the "Options" column; if there are no icons in the column, this is a finding.

Note: The "Action" column and the "Option" column are usually near the right edge; it may be necessary to use the slide to view them.

Vulnerability Number

V-228836

Documentable

False

Rule Version

PANW-AG-000024

Severity Override Guidance

Go to Policies >> Security
View the configured security policies.

For any Security Policy where the "Action" column shows "deny", view the "Options" column; if there are no icons in the column, this is a finding.

Note: The "Action" column and the "Option" column are usually near the right edge; it may be necessary to use the slide to view them.

Check Content Reference

M

Target Key

4233

Comments