Skip to content

Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.

An XCCDF Rule

Description

The SIEM or Central Log Server is the mitigation method for most of the other STIGs applied to an organization. Robust alerting and reporting is a key feature in any incident response plan. The ability to report on logon attempts is the first step is creating a chain of events for a forensic analysis and incident response.

ID
SV-221942r961824_rule
Version
SPLK-CL-000280
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A.

Configure Splunk Enterprise using the reporting and notification tools to create a report that audits the logon attempts. Make this report available to the ISSM and other required individuals.