From IBM DataPower Network Device Management Security Technical Implementation Guide
Part of SRG-APP-000089-NDM-000221
Associated with: CCI-000169
Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.
Control Panel >> View Logs Select “DOD-EventsLog” from the drop-down list at the top of the page. If the log is empty, this is a finding.
Privileged account user logon to default domain In the search field, enter “Log Target”. From the search results, click “Log Target”. Click “Add”. Name: enter the name of the log target (e.g., targetDodEvents) Target Type: File Log Format: XML Timestamp format: Syslog Destination Configuration: File Name: logstore:///dodEvents.log Log Size: 1024 Archive Mode: Rotate Number of Rotations: 6 Click on the “Event Filters” Tab. Event Subscription Filter, click “Select Code”; select an Event Code from the list in the popup window. Click the “Add” button. Repeat the process until all desired event codes have been added. Click “Apply” to save the changes to the running configuration. Click “Save Configuration” to save the changes to the persisted configuration.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer