VCWN-65-000036 - The vCenter Server for Windows must produce audit records containing information to establish what type of events occurred.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.

Solution

From the vSphere Web Client go to Host and Clusters >> Select a vCenter Server >> Configure >> Settings >> Advanced Settings. Click 'Edit' and edit the 'config.log.level' setting to 'info' or if the value does not exist create it by entering the values in the 'Key' and 'Value' fields and clicking 'Add'.

or

From a PowerCLI command prompt while connected to the vCenter server run the following command:

If the setting already exists:
Get-AdvancedSetting -Entity <vcenter server name> -Name config.log.level | Set-AdvancedSetting -Value info

If the setting does not exist:
New-AdvancedSetting -Entity <vcenter server name> -Name config.log.level -Value info

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12, CAT|III, CCI|CCI-002702, Rule-ID|SV-216858r612237_rule, STIG-ID|VCWN-65-000036, STIG-Legacy|SV-104611, STIG-Legacy|V-94781, Vuln-ID|V-216858

Plugin: VMware

Control ID: e203fa96f698cc58439d938a5095b5a2e1aed8c51315569632aac9569f96b116