Ensure the default plugins for the audit dispatcher are Installed
Appropriate Action Must be Setup When the Internal Audit Event Queue is Full
Ensure Rsyslog Authenticates Off-Loaded Audit Records
Ensure Rsyslog Encrypts Off-Loaded Audit Records
Ensure Logs Sent To Remote Host
Configure audispd Plugin To Send Logs To Remote Server
Configure audispd's Plugin disk_full_action When Disk Is Full
Encrypt Audit Records Sent With audispd Plugin
Configure audispd's Plugin network_failure_action On Network Failure
Configure auditd to use audispd's remote logging daemon
Ensure the audispd's remote logging daemon direction is correct
Ensure the audispd's remote logging daemon executable is correct
Ensure the audispd's remote logging daemon type is correct
Set type of computer node name logging in audit logs
Offload audit Logs to External Media
The A10 Networks ADC must, at a minimum, off-load audit log records onto a centralized log server.
The A10 Networks ADC must off-load audit records onto a different system or media than the system being audited.
AAA Services must be configured to send audit records to a centralized audit server.
Kona Site Defender must off-load audit records onto a centralized log server.
Kona Site Defender must off-load audit records onto a centralized log server in real time.
The Apache web server must not impede the ability to write specified log record content to an audit log server.
The Apache web server must be configurable to integrate with an organizations security infrastructure.
The ALG must off-load audit records onto a centralized log server.
The ALG must off-load audit records onto a centralized log server in real time.
The ALG that is part of a CDS must have the capability to implement journaling.
The Arista Multilayer Switch must, at a minimum, off-load audit records for interconnected systems in real time.
The application server must off-load log records onto a different system or media from the system being logged.
The application server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly.
The Arista network Arista device must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.
The application must off-load audit records onto a different system or media than the system being audited.
The application must be configured to write application logs to a centralized log repository.
The BlackBerry UEM server must be configured to transfer BlackBerry UEM server logs to another server for storage, analysis, and reporting.
Note: BlackBerry UEM server logs include logs of MDM events and logs transferred to the BlackBerry UEM server by MDM agents of managed devices.
The CA API Gateway must off-load audit records onto a different system or media than the system being audited.
The CA API Gateway must off-load audit records onto a centralized log server.
The CA API Gateway must off-load audit records onto a centralized log server in real time.
The Central Log Server must be configured to off-load log records onto a different system or media than the system being audited.
The Central Log Server must be configured to off-load interconnected systems in real time and off-load standalone systems weekly, at a minimum.
The DBN-6300 must off-load log records to a centralized log server.
The DBN-6300 must off-load log records to a centralized log server in real time.
The DBN-6300 must off-load audit records onto a different system or media than the system being audited.
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
All Docker Engine - Enterprise nodes must be configured with a log driver plugin that sends logs to a remote log aggregation system (SIEM).
The firewall must be configured to send traffic log entries to a central audit server for management and configuration of the traffic log entries.
The FortiGate device must off-load audit records on to a different system or media than the system being audited.
The FortiGate firewall must send traffic log entries to a central audit server for management and configuration of the traffic log entries.
CounterACT must off-load audit records onto a centralized log server.
CounterACT must off-load audit records onto a centralized log server in real time.
CounterACT must sent audit logs to a centralized audit server (i.e., syslog server).
The Forescout must configure a remote syslog where audit records are stored on a centralized logging target that is different from the system being audited.
Forescout must off-load log records onto a different system. This is required for compliance with C2C Step 1.
The HP FlexFabric Switch must off-load audit records onto a different system or media than the system being audited.
The HYCU server must be configured to conduct backups of system-level information when changes occur and to offload audit records onto a different system or media.
The DataPower Gateway must off-load audit records onto a different system or media than the system being audited.
The DataPower Gateway must off-load audit records onto a centralized log server.
The DataPower Gateway must off-load audit records onto a centralized log server in real time.
The MQ Appliance messaging server must off-load log records onto a different system or media from the system being logged.
The MQ Appliance messaging server must, at a minimum, transfer the logs of interconnected systems in real time, and transfer the logs of standalone systems weekly.
The WebSphere Liberty Server must be configured to offload logs to a centralized system.
DB2 must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
The MaaS360 MDM server must be configured to transfer MaaS360 MDM server logs to another server for storage, analysis, and reporting.
Note: MaaS360 MDM server logs include logs of MDM events and logs transferred to the MaaS360 MDM server by MDM agents of managed devices.
The MQ Appliance network device must off-load audit records onto a different system or media than the system being audited.
CA VM:Secure product audit records must offload audit records to a different system or media.
CA VM:Secure product audit records must be offloaded on a weekly basis.
The IDPS must off-load log records to a centralized log server.
The IDPS must off-load log records to a centralized log server in real-time.
The Ivanti MobileIron Core server must be configured to transfer Ivanti MobileIron Core server logs to another server for storage, analysis, and reporting. Note: Ivanti MobileIron Core server logs include logs of UEM events and logs transferred to the Ivanti MobileIron Core server by UEM agents of managed devices.
The Ivanti MobileIron Core server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
MobileIron Sentry must off-load audit records onto a different system or media than the system being audited.
The ISEC7 EMM Suite must back up audit records at least every seven days onto a different system or system component than the system or component being audited, provide centralized management and configuration of the content to be captured in audit records generated by all ISEC7 EMM Suite components, and off-load audit records onto a different system or media than the system being audited.
The Sentry must offload audit records onto a centralized log server.
The Sentry must offload audit records onto a centralized log server in real time.
The Jamf Pro EMM server must be configured to transfer Jamf Pro EMM server logs to another server for storage, analysis, and reporting.
Note: Jamf Pro EMM server logs include logs of MDM events and logs transferred to the Jamf Pro EMM server by MDM agents of managed devices.
The JBoss server must be configured to utilize syslog logging.
JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis.
The Juniper router must be configured to off-load log records onto a different system than the system being audited.
The Juniper router must be configured to send log data to at least two syslog servers for the purpose of forwarding alerts to the administrators and the Information System Security Officers (ISSO).
The Mainframe Product must off-load audit records onto a different system or media than the system being audited.
The MobileIron Core v10 server must be configured to transfer MobileIron Core v10 server logs to another server for storage, analysis, and reporting. Note: MobileIron Core v10 server logs include logs of MDM events and logs transferred to the MobileIron Core v10 server by MDM agents of managed devices.
Microsoft Android 11 must be configured to enable audit logging.
Motorola Solutions Android 11 must be configured to enable audit logging.
Azure SQL Database must offload audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
ONTAP must be configured to send audit log data to a central log server.
The network device must off-load audit records onto a different system or media than the system being audited.
The network device must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
Nutanix AOS must offload log records onto a syslog server.
Nutanix AOS must offload audit records to a syslog server.
OHS must be configured to store error log files to an appropriate storage device from which other tools can be configured to reference those log files for diagnostic/forensic purposes.
OHS must be configured to store access log files to an appropriate storage device from which other tools can be configured to reference those log files for diagnostic/forensic purposes.
Oracle WebLogic must provide the ability to write specified audit record content to an audit log server.
Prisma Cloud Compute must be configured to send events to the hosts' syslog.
The Riverbed NetProfiler must be configured to use redundant Syslog servers that are configured on a different system than the NetProfiler appliance.
Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
Innoslate must off-load audit records onto a different system or media than the system being audited.
The Samsung SDS EMM must be configured to transfer Samsung SDS EMM logs to another server for storage, analysis, and reporting.
Note: Samsung SDS EMM logs include logs of MDM events and logs transferred to the Samsung SDS EMM by MDM agents of managed devices.
Symantec ProxySG must use a centralized log server.
Symantec ProxySG must be configured to send the access logs to the centralized log server continuously.
A Tanium connector must be configured to send log data to an external audit log reduction-capable system and provide alerts.
Symantec ProxySG must be configured to support centralized management and configuration of the audit log.
The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly.
The Tanium application must offload audit records onto a different system or media than the system being audited.
A Tanium connector must be configured to send log data to an external audit log reduction capable system.
The TPS and SMS must off-load log records to a centralized log server.
The Tanium operating system (TanOS) must offload audit records onto a different system or media than the system being audited.
The UEM Agent must queue alerts if the trusted channel is not available.
The UEM Agent must be configured to enable the following function: transfer managed endpoint device audit logs read by the UEM Agent to an UEM server or third-party audit management server.
The TippingPoint SMS must automatically generate audit records for account changes and actions with containing information needed for analysis of the event that occurred on the SMS and TPS.
The UEM server must be configured to transfer UEM server logs to another server for storage, analysis, and reporting. Note: UEM server logs include logs of UEM events and logs transferred to the UEM server by UEM agents of managed devices.
The UEM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
The NSX-T Manager must be configured to send logs to a central log server.
The Horizon Connection Server must offload events to a central log server in real time.
The Workspace ONE UEM server must be configured to transfer Workspace ONE UEM server logs to another server for storage, analysis, and reporting.
Note: Workspace ONE UEM server logs include logs of MDM events and logs transferred to the Workspace ONE UEM server by MDM agents of managed devices.
The VPN Gateway must off-load audit records onto a different system or media than the system being audited.
The Apache web server must be configured to integrate with an organizations security infrastructure.
The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system in real time, if the system is interconnected.
The Ubuntu operating system must have a crontab script running weekly to off-load audit events of standalone systems.
The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system or storage media from the system being audited.
The Ubuntu operating system must have a crontab script running weekly to offload audit events of standalone systems.
The Cisco ASA must be configured to off-load log records to a centralized log server.
PostgreSQL must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
The Cisco ASA must be configured to offload audit records onto a different system or media than the system being audited.
The Cisco ASA must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to organization-defined personnel and/or the firewall administrator.
The Cisco router must be configured to send log data to at least two syslog servers for the purpose of forwarding alerts to the administrators and the ISSO.
The Cisco switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
The Cisco router must be configured to send log data to at least two syslog servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
The Cisco router must be configured to off-load log records onto a different system than the system being audited.
The Cisco ISE must configure a remote syslog where audit records are stored on a centralized logging target that is different from the system being audited.
The Cisco ISE must off-load log records onto a different system. This is required for compliance with C2C Step 1.
The Cisco switch must be configured to off-load log records onto a different system than the system being audited.
The Cisco ISE must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
Audit records must be stored at a secondary location.
The DBMS must off-load audit data to a separate log management facility; this shall be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
The EDB Postgres Advanced Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
The HPE Nimble must configure a syslog server onto a different system or media than the system being audited.
The operating system must offload audit records onto a different system or media from the system being audited.
The operating system must, at a minimum, off-load audit data from interconnected systems in real time and off-load audit data from standalone systems weekly.
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
SSMC web server must not impede the ability to write specified log record content to an audit log server.
The HPE 3PAR OS must be configured to offload audit records onto a different system or media from the system being audited.
AIX must implement a remote syslog server that is documented using site-defined procedures.
AIX must be configured so that the audit system takes appropriate action when the audit storage volume is full.
IBM z/OS system administrators must develop an automated process to collect and retain SMF data.
IBM z/OS system administrator must develop a procedure to offload SMF files to a different system or media than the system being audited.
IBM z/OS System Administrators must develop an automated process to collect and retain SMF data.
The ICS must be configured to send user traffic log data to redundant central log server.
The ICS must be configured to send admin log data to a redundant central log server.
The Juniper EX switch must be configured to offload audit records onto a different system or media than the system being audited.
MarkLogic Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
MariaDB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
Both the log file and Event Tracing for Windows (ETW) for the IIS 10.0 web server must be enabled.
The system SQL Server must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
Audit records must be backed up to a different system or media than the system being audited.
Windows Server 2016 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.
Windows Server 2019 audit records must be backed up to a different system or media than the system being audited.
Windows Server 2019 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.
Windows Server 2022 audit records must be backed up to a different system or media than the system being audited.
Windows Server 2022 must, at a minimum, offload audit records of interconnected systems in real time and offload standalone or nondomain-joined systems weekly.
Oracle Database must off-load audit data to a separate log management facility; this must be continuous and in near-real-time for systems with a network connection to the storage facility, and weekly or more often for stand-alone systems.
The Oracle Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.
The Oracle Linux operating system must take appropriate action when the remote logging buffer is full.
The Oracle Linux operating system must label all off-loaded audit logs before sending them to the central log server.
The Oracle Linux operating system must off-load audit records onto a different system or media from the system being audited.
The Oracle Linux operating system must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.
The Oracle Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.
The Oracle Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.
OL 8 must label all offloaded audit logs before sending them to the central log server.
The OL 8 audit records must be offloaded onto a different system or storage media from the system being audited.
OL 8 must take appropriate action when the internal event queue is full.
OL 8 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited.
OL 8 must authenticate the remote logging server for offloading audit logs.
The MySQL Database Server 8.0 must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited.
The Palo Alto Networks security platform must, at a minimum, off-load threat and traffic log records onto a centralized log server in real time.
The Palo Alto Networks security platform must off-load log records to a centralized log server.
The Palo Alto Networks security platform must off-load log records to a centralized log server in real-time.
Automation Controller must use external log providers that can collect user activity logs in independent, protected repositories to prevent modification or repudiation.
Redis Enterprise DBMS must offload audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility, and weekly or more often for stand-alone systems.
Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
OpenShift components must provide the ability to send audit logs to a central enterprise repository for review and analysis.
The Red Hat Enterprise Linux operating system must be configured to off-load audit logs onto a different system or storage media from the system being audited.
The Red Hat Enterprise Linux operating system must take appropriate action when the remote logging buffer is full.
The Red Hat Enterprise Linux operating system must label all off-loaded audit logs before sending them to the central log server.
The Red Hat Enterprise Linux operating system must off-load audit records onto a different system or media from the system being audited.
The Red Hat Enterprise Linux operating system must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.
The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when the audit storage volume is full.
The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.
RHEL 8 must label all off-loaded audit logs before sending them to the central log server.
The RHEL 8 audit records must be off-loaded onto a different system or storage media from the system being audited.
RHEL 8 must take appropriate action when the internal event queue is full.
RHEL 8 must encrypt the transfer of audit records off-loaded onto a different system or media from the system being audited.
RHEL 8 must authenticate the remote logging server for off-loading audit logs.
The audit-audispd-plugins must be installed on the SUSE operating system.
The SUSE operating system audit event multiplexor must be configured to use Kerberos.
Audispd must off-load audit records onto a different system or media from the SUSE operating system being audited.
The audit system must take appropriate action when the network cannot be used to off-load audit records.
Audispd must take appropriate action when the SUSE operating system audit storage is full.
The SUSE operating system must off-load rsyslog messages for networked systems in real time and off-load standalone systems at least weekly.
RHEL 9 must have the rsyslog package installed.
RHEL 9 must be configured to offload audit records onto a different system from the system being audited via syslog.
RHEL 9 must authenticate the remote logging server for offloading audit logs via rsyslog.
RHEL 9 must encrypt the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.
RHEL 9 must encrypt via the gtls driver the transfer of audit records offloaded onto a different system or media from the system being audited via rsyslog.
RHEL 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.
RHEL 9 must allocate audit record storage capacity to store at least one week's worth of audit records.
RHEL 9 must label all offloaded audit logs before sending them to the central log server.
RHEL 9 must take appropriate action when the internal event queue is full.
RHEL 9 audispd-plugins package must be installed.
The SUSE operating system must off-load audit records onto a different system or media from the system being audited.
Splunk Enterprise must be configured to offload log records onto a different system or media than the system being audited.
The VMM must off-load audit records onto a different system or media than the system being audited.
The VMM must, at a minimum, off-load interconnected systems in real time and off-load standalone systems weekly.
Remote logging for ESXi hosts must be configured.
The rsyslog must be configured to monitor VAMI logs.
Rsyslog must be configured to monitor and ship Performance Charts log files.
Rsyslog must be configured to monitor and ship ESX Agent Manager log files.
Lookup Service log files must be offloaded to a central log server in real time.
The ESXi host must off-load logs via syslog.
The ESXi host must off-load audit records via syslog.
The vCenter Server must be configured to send logs to a central log server.
The vCenter server must be configured to send events to a central log server.
"Rsyslog" must be configured to monitor VMware Postgres logs.
Envoy (rhttpproxy) log files must be shipped via syslog to a central log server.
Envoy log files must be shipped via syslog to a central log server.
The vCenter Rhttpproxy service log files must be sent to a central log server.
The vCenter Envoy service log files must be sent to a central log server.
Security Token Service log data and records must be backed up onto a different system or media.
The vCenter ESX Agent Manager service must offload log records onto a different system or media from the system being logged.
The vCenter Lookup service must offload log records onto a different system or media from the system being logged.
vSphere UI log files must be moved to a permanent repository in accordance with site policy.
The vCenter Perfcharts service must offload log records onto a different system or media from the system being logged.
The vCenter PostgreSQL service must off-load audit data to a separate log management facility.
The vCenter STS service must offload log records onto a different system or media from the system being logged.
The vCenter UI service must offload log records onto a different system or media from the system being logged.
The vCenter VAMI service must off-load log records onto a different system or media from the system being logged.
The web server must not impede the ability to write specified log record content to an audit log server.
The web server must be configurable to integrate with an organizations security infrastructure.
Zebra Android 11 must be configured to enable audit logging.
The BIG-IP appliance must be configured to off-load audit records onto a different system or media than the system being audited.
Ubuntu 22.04 LTS must have a crontab script running weekly to offload audit events of standalone systems.
Ubuntu 22.04 LTS audit event multiplexor must be configured to offload audit logs onto a different system from the system being audited.
PostgreSQL must offload audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for standalone systems.
The Infrastructure as a Service (IaaS)/Platform as a Service (PaaS) must perform centralized logging to capture and store log records.
The Dragos Platform must be configured to send backup audit records.
The Enterprise Voice, Video, and Messaging Endpoint must offload audit records onto a different system or media than the system being audited.
The Enterprise Voice, Video, and Messaging Endpoint must, at a minimum, offload interconnected systems in real-time and offload standalone systems weekly.
The Enterprise Voice, Video, and Messaging Session Manager must be configured to offload session (call) records to a central log server.
The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
The F5 BIG-IP appliance must generate audit records and send records to redundant central syslog servers that are separate from the appliance.
The ISEC7 SPHERE must back up audit records at least every seven days onto a different system or system component than the system or component being audited, provide centralized management and configuration of the content to be captured in audit records generated by all ISEC7 SPHERE components, and offload audit records onto a different system or media than the system being audited.
The Ivanti EPMM server must be configured to transfer Ivanti EPMM server logs to another server for storage, analysis, and reporting. Note: Ivanti EPMM server logs include logs of UEM events and logs transferred to the Ivanti EPMM server by UEM agents of managed devices.
The Ivanti EPMM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
Sentry must offload audit records onto a different system or media than the system being audited.
The Juniper EX switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
The Juniper SRX Services Gateway Firewall must be configured to support centralized management and configuration of the audit log.
MKE must be configured to send audit data to a centralized log server.
MongoDB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for standalone systems.
Microsoft Intune service must be configured to transfer Intune logs to another server for storage, analysis, and reporting at least every seven days.
SLEM 5 must offload rsyslog messages for networked systems in real time and offload standalone systems at least weekly.
The audit-audispd-plugins package must be installed on SLEM 5.
SLEM 5 must offload audit records onto a different system or media from the system being audited.
Audispd must take appropriate action when SLEM 5 audit storage is full.
SLEM 5 audit event multiplexor must be configured to use Kerberos.
Audispd must offload audit records onto a different system or media from SLEM 5 being audited.
The TPS must provide audit record generation capability for detection events based on implementation of policy filters, rules, signatures, and anomaly analysis.
The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
The TOSS audit records must be offloaded onto a different system or storage media from the system being audited.
TOSS must label all off-loaded audit logs before sending them to the central log server.
The NSX Manager must be configured to send logs to a central log server.
The NSX Tier-0 Gateway Firewall must be configured to send traffic log entries to a central audit server.
TOSS must take appropriate action when the internal event queue is full.
The NSX Tier-1 Gateway firewall must be configured to send traffic log entries to a central audit server.
The ESXi host must offload logs via syslog.