VCUI-67-000027 - vSphere UI log files must be moved to a permanent repository in accordance with site policy - access

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

vSphere UI produces a handful of logs that must be offloaded from the originating system. This information can then be used for diagnostic, forensic, or other purposes relevant to ensuring the availability and integrity of the hosted application.

Satisfies: SRG-APP-000358-WSR-000163, SRG-APP-000108-WSR-000166, SRG-APP-000125-WSR-000071

Solution

Navigate to and open /etc/vmware-syslog/stig-services-vsphere-ui.conf.

Create the file if it does not exist.

Set the contents of the file as follows:

input(type='imfile'
File='/var/log/vmware/vsphere-ui/logs/access/localhost_access*'
Tag='ui-access'
Severity='info'
Facility='local0')
input(type='imfile'
File='/var/log/vmware/vsphere-ui/logs/vsphere-ui-runtime*'
Tag='ui-runtime'
Severity='info'
Facility='local0')

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000139, CCI|CCI-001348, CCI|CCI-001851, Rule-ID|SV-239708r679230_rule, STIG-ID|VCUI-67-000027, Vuln-ID|V-239708

Plugin: Unix

Control ID: db374da387f5ba1503fc47af2782eef635e5753dcd719e16c214f7f60f6b6bd9