STIGQter STIGQter: STIG Summary: Central Log Server Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

The Central Log Server must be configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.

DISA Rule

SV-95853r1_rule

Vulnerability Number

V-81139

Group Title

SRG-APP-000353-AU-000060

Rule Version

SRG-APP-000353-AU-000060

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Central Log Server so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application.

Check Contents

Examine the configuration.

Verify the system is configured so changes made to the level and type of log records stored in the centralized repository take effect immediately without the need to reboot or restart the application.

If the Central Log Server is not configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application, this is a finding.

Vulnerability Number

V-81139

Documentable

False

Rule Version

SRG-APP-000353-AU-000060

Severity Override Guidance

Examine the configuration.

Verify the system is configured so changes made to the level and type of log records stored in the centralized repository take effect immediately without the need to reboot or restart the application.

If the Central Log Server is not configured so changes made to the level and type of log records stored in the centralized repository must take effect immediately without the need to reboot or restart the application, this is a finding.

Check Content Reference

M

Target Key

3395

Comments