STIGQter STIGQter: STIG Summary: Infoblox 7.x DNS Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

In the event of a system failure, The Infoblox system must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

DISA Rule

SV-214177r612370_rule

Vulnerability Number

V-214177

Group Title

SRG-APP-000226-DNS-000032

Rule Version

IDNS-7X-000310

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab.

Enable "Log to External Syslog Server", Configure at least one "External Syslog Servers".
When complete, click "Save & Close" to save the changes and exit the "Properties" screen.

Perform a service restart if necessary.

Check Contents

By default all system events are logged to the local SYSLOG. To ensure logging of data in the event of system failure, an external log server must be configured.

Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab.

When complete, click "Cancel" to exit the "Properties" screen.

If "Log to External Syslog Servers" is enabled, an External Syslog Server must be configured and "Copy Audit Log Message to Syslog" must be configured otherwise, this is a finding.

Vulnerability Number

V-214177

Documentable

False

Rule Version

IDNS-7X-000310

Severity Override Guidance

By default all system events are logged to the local SYSLOG. To ensure logging of data in the event of system failure, an external log server must be configured.

Navigate to Grid >> Grid Manager >> Grid Properties >> Monitoring tab.

When complete, click "Cancel" to exit the "Properties" screen.

If "Log to External Syslog Servers" is enabled, an External Syslog Server must be configured and "Copy Audit Log Message to Syslog" must be configured otherwise, this is a finding.

Check Content Reference

M

Target Key

3995

Comments