SRG-OS-000217-ESXI5 - The operating system must protect the audit records resulting from non-local accesses to privileged accounts and the execution of privileged functions.

Information

Remote logging to a central log host provides a secure, centralized store for ESXi logs. By gathering host log files onto a central host it can more easily monitor all hosts with a single tool. It can also do aggregate analysis and searching to look for such things as coordinated attacks on multiple hosts. Logging to a secure, centralized log server also helps prevent log tampering and also provides a long-term audit record.

Solution

Step 1: Verify the vSphere Syslog Collector syslog host has been configured. If not, install/enable the vSphere Syslog Collector.
Step 2: From the vSphere Client: Select the host and click 'Configuration >> Advanced Settings >> Syslog >> Global'.
Step 3: Set 'Syslog.global.logHost' to the syslog server hostname.

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-250647r798940_rule, STIG-ID|SRG-OS-000217-ESXI5, STIG-Legacy|SV-51268, STIG-Legacy|V-39410, Vuln-ID|V-250647

Plugin: VMware

Control ID: 7a2b318d9a9779b0c363e8ad0d1181fe2ea75d69b1077ac30400a7b242fb8eeb