JUSX-DM-000024 - The Juniper SRX Services Gateway must generate an immediate alert message to the management console for account enabling actions.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

In order to detect and respond to events that affect network administrator accessibility and device processing, network devices must audit account enabling actions and, as required, notify the appropriate individuals so they can investigate the event.

Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system).

Accounts can be disabled by configuring the account with the built-in login class 'unauthorized'. When the command is reissued with a different login class, the account is enabled.

Solution

The following commands configure the device to immediately display a message to any currently logged on administrator's console when changes are made to the configuration. This is an example method. Alerts must be sent immediately to the designated individuals (e.g., via Syslog configuration, SNMP trap, manned console message, or other events monitoring system).

[edit]
set system syslog users * change-log <info | any>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-001328, Rule-ID|SV-229019r518235_rule, STIG-ID|JUSX-DM-000024, STIG-Legacy|SV-80961, STIG-Legacy|V-66471, Vuln-ID|V-229019

Plugin: Juniper

Control ID: 51f185fbade0d080ccc4bf177e6651c0abe2be705f777810f12527bf3246b094