Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.
An XCCDF Rule
Description
The SIEM or Central Log Server is the mitigation method for most of the other STIGs applied to an organization. Robust alerting and reporting is a key feature in any incident response plan. The ability to report on logon attempts is the first step is creating a chain of events for a forensic analysis and incident response.
- ID
- SV-221942r961824_rule
- Version
- SPLK-CL-000280
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A.
Configure Splunk Enterprise using the reporting and notification tools to create a report that audits the logon attempts. Make this report available to the ISSM and other required individuals.