The DBN-6300 must produce audit records containing information to establish where the events occurred.
An XCCDF Rule
Description
<VulnDiscussion>In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as device hardware components, device software modules, session identifiers, filenames, host names, and functionality. Location of events includes hardware components, device software module, session identifiers, filenames, host names, and functionality.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-91633r1_rule
- Severity
- Low
- References
- Updated
Remediation - Manual Procedure
Configure the DBN-6300 to be connected to the syslog server. Also configure the DBN-6300 to include audit records in the syslog message feed.
Navigate to Settings >> Advanced >> Syslog.
Enter the syslog connection information (port and IP address) and push the "enabled" button for both "TCP" and "enable".