ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without establishing what types of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack.

Satisfies: SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310

Solution

From the vSphere Client, select the ESXi Host and go to Configure >> System >> Advanced System Settings.

Click 'Edit', select the 'Config.HostAgent.log.level' value, and configure it to 'info'.

or

From a PowerCLI command prompt while connected to the ESXi host, run the following commands:

Get-VMHost | Get-AdvancedSetting -Name Config.HostAgent.log.level | Set-AdvancedSetting -Value 'info'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-7_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12(3), CAT|III, CCI|CCI-000130, CCI|CCI-000171, Rule-ID|SV-239285r674784_rule, STIG-ID|ESXI-67-000030, STIG-Legacy|SV-104093, STIG-Legacy|V-94007, Vuln-ID|V-239285

Plugin: VMware

Control ID: d756b9664c75acb1fbf902ea147c187fdb35a24882fd821a807fff0d7251c81f