STIGQter STIGQter: STIG Summary: VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 28 Sep 2018:

tc Server HORIZON log files must be protected from unauthorized modification.

DISA Rule

SV-100633r1_rule

Vulnerability Number

V-89983

Group Title

SRG-APP-000119-WSR-000069

Rule Version

VRAU-TC-000275

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

At the command prompt, execute the following command:

chown <owner>:<owner> /storage/log/vmware/vcac/<file>

Note: Substitute <file> with the listed file.

Note: Substitute <owner> with the correct value below.

The following files should be owned by "vcac":
access_log
catalina.out
gc_logs
host-manager
localhost
manager
tc Server.pid

The following files should be owned by "root":
system-config-history
telemetry
toolsgc
vcac-config

Check Contents

At the command prompt, execute the following command:

ls -lL /storage/log/vmware/vcac

If any log files are not owned by "root" or "vcac", this is a finding.

The following files should be owned by "vcac":
access_log
catalina.out
gc_logs
host-manager
localhost
manager
tc Server.pid

The following files should be owned by "root":
system-config-history
telemetry
toolsgc
vcac-config

Vulnerability Number

V-89983

Documentable

False

Rule Version

VRAU-TC-000275

Severity Override Guidance

At the command prompt, execute the following command:

ls -lL /storage/log/vmware/vcac

If any log files are not owned by "root" or "vcac", this is a finding.

The following files should be owned by "vcac":
access_log
catalina.out
gc_logs
host-manager
localhost
manager
tc Server.pid

The following files should be owned by "root":
system-config-history
telemetry
toolsgc
vcac-config

Check Content Reference

M

Target Key

3439

Comments