RHEL-10-200647 - RHEL 10 must monitor all remote access methods.

Information

Logging remote access methods can be used to trace the decrease in the risks associated with remote user access management. It can also be used to spot cyberattacks and ensure ongoing compliance with organizational policies surrounding the use of remote access methods.

Solution

Configure RHEL 10 to monitor all remote access methods.

Add or update the following lines to the "/etc/rsyslog.conf" file or a file in "/etc/rsyslog.d":

auth.*;authpriv.*;daemon.* /var/log/secure

Restart the "rsyslog" service with the following command for the changes to take effect:

$ sudo systemctl restart rsyslog.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_10_V1R1_STIG.zip