Warning! Audit Deprecated
Information
Configuring a syslog allows BIND to log any information the administrator sees as important to the health and security of BIND.
Rationale:
Logging is key to monitoring the health and security of the name server and for detecting potential abuse and malicious attacks. Most requests that are invalid or violate an ACL will be logged, so it is important for such logs to come to the attention of the appropriate system administer. Logging is also helpful for debugging your BIND configuration. It is important that you know what kind of logs are going to what channel.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
The name server should be configured with at least two channels, a syslog channel to receive a majority of the messages, and a local file to log with duplicates of logs that may be of interest for security and possibly a second log file to be used for debugging. It is possible to configure more channels for more specific types of information. Configure the default and general categories to log to the local syslog