Splunk Enterprise must be configured to offload log records onto a different system or media than the system being audited.
An XCCDF Rule
Description
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Although this may be part of the operating system function, for the enterprise events management system, this is most often a function managed through the application since it is a critical function and requires the use of a large amount of external storage.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-251668r961395_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
This configuration is performed on the machine used as a forwarder, which is always a separate machine regardless of environment.
On the forwarders, configure the outputs.conf with the information of the indexer that the data will be sent to for analysis.
This configuration is performed on the machine used as the assigned indexer to the forwarder in a distributed environment.