Information
After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event.
Satisfies: SRG-APP-000095-WSR-000056, SRG-APP-000096-WSR-000057, SRG-APP-000097-WSR-000058, SRG-APP-000098-WSR-000059, SRG-APP-000099-WSR-000061, SRG-APP-000100-WSR-000064, SRG-APP-000374-WSR-000172, SRG-APP-000375-WSR-000171
Solution
Navigate to and open /opt/vmware/etc/lighttpd/lighttpd.conf.
Comment any existing accesslog.format lines by adding a '#' at the beginning of the line.
Item Details
References: CAT|II, CCI|CCI-000130, CCI|CCI-000131, CCI|CCI-000132, CCI|CCI-000133, CCI|CCI-000134, CCI|CCI-001487, CCI|CCI-001889, CCI|CCI-001890, Rule-ID|SV-239720r679270_rule, STIG-ID|VCLD-67-000006, Vuln-ID|V-239720
Control ID: 5ecd4934ac1fb1cb26420aff9328b5d63d3e84fa8c41b503519f9a3dbc8b55a0