3.6 Ensure logging is enabled on all firewall policies

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Logging should be enabled for all firewall policies including the default implicit deny policy.

Rationale:

Firewall policies should log for all traffic (both allow and deny policies). This enables SOC or security analyst to do further investigations on security incidents especially on threat hunting or incident response activities. Although there are many data sources that can provide DNS query logs (AD or EDR), but this option should be enabled out of best practice and with assumption that no other data sources is available.

Impact:

By default, when creating firewall policies, logging option is not enabled. Also, the default implicit deny policy is not logged. This creates data gap in threat hunting or incident response activities.

Solution

Review firewall policies and ensure that:
For allowed policies, 'Log Allowed Traffic' is set on 'All Sessions' option
For denied policies, 'Log Violation Traffic' is enabled.

Default Value:

Disabled