3.6 Ensure Firewall Logging Is Enabled and Configured - EnableLogging

Information

The socketfilter Firewall is what is used when the Firewall is turned on in the Security & Privacy Preference Pane. In order to appropriately monitor what access is allowed and denied, logging must be enabled. The logging level must be set to 'detailed' to be useful in monitoring connection attempts that the firewall detects. Throttled login is not sufficient for examine Firewall connection attempts.

In depth log monitoring on macOS may require changes to the 'Enable-Private-Data' key in SystemLogging.System to ensure more complete logging.

Reviewing macOS Unified Logs

Rationale:

In order to troubleshoot the successes and failures of a Firewall, detailed logging should be enabled.

Impact:

Detailed logging may result in excessive storage.

Solution

Terminal Method:
Run the following command to enable logging of the firewall:

$ /usr/bin/sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setloggingmode on

Turning on log mode

$ /usr/bin/sudo /usr/libexec/ApplicationFirewall/socketfilterfw --setloggingopt detail

Setting detail log option

Note: If the Firewall settings are set through a configuration profile, then modifications cannot be done through the command line. If attempted, you will receive the message Firewall settings cannot be modified from command line on managed Mac computers.
Profile Method:
Create or edit a configuration profile with the following information:

The PayloadType string is com.apple.security.firewall

The key to include is EnableFirewall

The key must be set to <true/>

The key to also include is EnableLogging

The key must be set to <true/>

The key to also include is LoggingOption

The key must be set to <string>detail</string>

Note: Firewall Logging must be enabled with this profile. It can either be set with the Firewall and Stealth Mode (2.5.2.2 and 2.5.2.3) or as a separate profile. Setting logging with its own profile will not cause a conflict.

See Also

https://workbench.cisecurity.org/files/4176

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AU-2, 800-53|AU-3, 800-53|AU-3(1), 800-53|AU-7, 800-53|AU-12, 800-53|SC-7, 800-53|SC-7(5), CSCv7|6.2, CSCv7|6.3, CSCv7|9.2

Plugin: Unix

Control ID: d9c84f5f31672116e9285e11a5b248ca9dda70b878617a64cbb71b7d62ca7509