STIGhub
STIGs
RMF Controls
Compare
← AC-17 (1) — Remote Access
CCI-000067
Definition
Employ automated mechanisms to monitor remote access methods.
Parent Control
AC-17 (1)
Remote Access
Access Control
Linked STIG Checks (158)
V-243498
CAT II
If a VPN is used in the AD implementation, the traffic must be inspected by the network Intrusion detection system (IDS).
Active Directory Domain Security Technical Implementation Guide
V-274021
CAT II
Amazon Linux 2023 must monitor remote access methods.
Amazon Linux 2023 Security Technical Implementation Guide
V-268088
CAT II
NixOS must monitor remote access methods.
Anduril NixOS Security Technical Implementation Guide
V-222930
CAT II
AccessLogValve must be configured for each application context.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-268031
CAT III
Apple iOS/iPadOS 18 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-278791
CAT III
Apple iOS/iPadOS 26 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-252463
CAT II
The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257169
CAT II
The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-259453
CAT II
The macOS system must be configured to audit all log on and log out events.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-268453
CAT II
The macOS system must be configured to audit all login and logout events.
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
V-277061
CAT II
The macOS system must be configured to audit all login and logout events.
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
V-204923
CAT II
The ALG providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
Application Layer Gateway Security Requirements Guide
V-204711
CAT II
The application server must ensure remote sessions for accessing security functions and security-relevant information are logged.
Application Server Security Requirements Guide
V-237323
CAT I
The ArcGIS Server must provide audit record generation capability for DoD-defined auditable events within all application components.
ArcGIS for Server 10.3 Security Technical Implementation Guide
V-79047
CAT II
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to enable audit logs.
BlackBerry Enterprise Mobility Server 2.x Security Technical Implementation Guide
V-254728
CAT II
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to enable audit logs.
BlackBerry Enterprise Mobility Server 3.x Security Technical Implementation Guide
V-219306
CAT II
The Ubuntu operating system must monitor remote access methods.
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
V-238324
CAT II
The Ubuntu operating system must monitor remote access methods.
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
V-260589
CAT II
Ubuntu 22.04 LTS must monitor remote access methods.
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
V-270681
CAT II
Ubuntu 24.04 LTS must monitor remote access methods.
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
V-239854
CAT II
The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules.
Cisco ASA Firewall Security Technical Implementation Guide
V-269111
CAT II
AlmaLinux OS 9 must log SSH connection attempts and failures to the server.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-269112
CAT II
All AlmaLinux OS 9 remote access methods must be monitored.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-235778
CAT II
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-235779
CAT II
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
V-214504
CAT II
The BIG-IP ASM module supporting intermediary services for remote access communications traffic must ensure inbound traffic is monitored for compliance with remote access security policies.
F5 BIG-IP Application Security Manager Security Technical Implementation Guide
V-215745
CAT II
The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
V-266138
CAT II
The F5 BIG-IP appliance providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
V-266254
CAT II
The F5 BIG-IP appliance that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
F5 BIG-IP TMOS Firewall Security Technical Implementation Guide
V-206676
CAT II
The firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
Firewall Security Requirements Guide
V-234134
CAT II
The FortiGate firewall must use organization-defined filtering rules that apply to the monitoring of remote access traffic for the traffic from the VPN access points.
Fortinet FortiGate Firewall Security Technical Implementation Guide
V-203602
CAT II
The operating system must monitor remote access methods.
General Purpose Operating System Security Requirements Guide
V-255255
CAT II
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
V-255256
CAT II
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
V-255257
CAT II
SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
V-215285
CAT II
AIX must monitor and record successful remote logins.
IBM AIX 7.x Security Technical Implementation Guide
V-215286
CAT II
AIX must monitor and record unsuccessful remote logins.
IBM AIX 7.x Security Technical Implementation Guide
V-255784
CAT II
The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
V-250325
CAT II
The WebSphere Liberty Server must log remote session and security activity.
IBM WebSphere Liberty Server Security Technical Implementation Guide
V-255820
CAT II
The WebSphere Application Server security auditing must be enabled.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255821
CAT II
The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255822
CAT II
The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255823
CAT II
The WebSphere Application Server audit event type filters must be configured.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255824
CAT II
The WebSphere Application Server audit service provider must be enabled.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-255825
CAT II
The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes.
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
V-223517
CAT II
IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223537
CAT II
The IBM z/OS BPX.SMF resource must be properly configured.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223586
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223599
CAT II
IBM z/OS PROFILE.TCPIP configuration statements for the TCP/IP stack must be coded properly.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223609
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
IBM z/OS ACF2 Security Technical Implementation Guide
V-252547
CAT II
IBM z/OS TCP/IP AT-TLS policy must be properly configured in Policy Agent.
IBM z/OS ACF2 Security Technical Implementation Guide
V-223733
CAT II
IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
IBM z/OS RACF Security Technical Implementation Guide
V-223758
CAT II
The IBM z/OS BPX.SMF resource must be properly configured.
IBM z/OS RACF Security Technical Implementation Guide
V-223759
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
IBM z/OS RACF Security Technical Implementation Guide
V-223806
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS RACF Security Technical Implementation Guide
V-223820
CAT II
IBM z/OS PROFILE.TCPIP configuration statements for the TCP/IP stack must be coded properly.
IBM z/OS RACF Security Technical Implementation Guide
V-252553
CAT II
IBM z/OS TCP/IP AT-TLS policy must be properly configured in Policy Agent.
IBM z/OS RACF Security Technical Implementation Guide
V-223974
CAT II
IBM z/OS SMF recording options for the FTP server must be configured to write SMF records for all eligible events.
IBM z/OS TSS Security Technical Implementation Guide
V-224000
CAT II
The IBM z/OS BPX.SMF resource must be properly configured.
IBM z/OS TSS Security Technical Implementation Guide
V-224054
CAT II
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
IBM z/OS TSS Security Technical Implementation Guide
V-224056
CAT II
IBM z/OS PROFILE.TCPIP configuration statements for the TCP/IP stack must be properly coded.
IBM z/OS TSS Security Technical Implementation Guide
V-224066
CAT II
IBM z/OS SMF recording options for the TN3270 Telnet server must be properly specified.
IBM z/OS TSS Security Technical Implementation Guide
V-252554
CAT II
IBM z/OS TCP/IP AT-TLS policy must be properly configured in Policy Agent.
IBM z/OS TSS Security Technical Implementation Guide
V-237899
CAT II
CA VM:Secure product must be installed and operating.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-237905
CAT II
For FTP processing Z/VM TCP/IP FTP server Exit must be enabled.
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
V-66645
CAT II
The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.
Juniper SRX SG VPN Security Technical Implementation Guide
V-214671
CAT II
The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.
Juniper SRX Services Gateway VPN Security Technical Implementation Guide
V-220757
CAT II
The system must be configured to audit Logon/Logoff - Logoff successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-220758
CAT II
The system must be configured to audit Logon/Logoff - Logon failures.
Microsoft Windows 10 Security Technical Implementation Guide
V-220759
CAT II
The system must be configured to audit Logon/Logoff - Logon successes.
Microsoft Windows 10 Security Technical Implementation Guide
V-253315
CAT II
The system must be configured to audit Logon/Logoff - Logoff successes.
Microsoft Windows 11 Security Technical Implementation Guide
V-242009
CAT II
Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.
Microsoft Windows Defender Firewall with Advanced Security Security Technical Implementation Guide
V-224892
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224893
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon successes.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-224894
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures.
Microsoft Windows Server 2016 Security Technical Implementation Guide
V-205634
CAT II
Windows Server 2019 must be configured to audit logon successes.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-205635
CAT II
Windows Server 2019 must be configured to audit logon failures.
Microsoft Windows Server 2019 Security Technical Implementation Guide
V-254312
CAT II
Windows Server 2022 must be configured to audit logon successes.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-254313
CAT II
Windows Server 2022 must be configured to audit logon failures.
Microsoft Windows Server 2022 Security Technical Implementation Guide
V-278059
CAT II
Windows Server 2025 must be configured to audit logon successes.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-278060
CAT II
Windows Server 2025 must be configured to audit logon failures.
Microsoft Windows Server 2025 Security Technical Implementation Guide
V-254123
CAT II
Nutanix AOS must monitor remote access methods.
Nutanix AOS 5.20.x OS Security Technical Implementation Guide
V-279531
CAT II
Nutanix OS must monitor SSH access.
Nutanix Acropolis GPOS Security Technical Implementation Guide
V-221289
CAT II
OHS must have the LoadModule log_config_module directive enabled to generate information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221290
CAT II
OHS must have the OraLogMode set to Oracle Diagnostic Logging text mode to generate information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221291
CAT II
OHS must have a log directory location defined to generate information for use by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221292
CAT II
OHS must have the OraLogSeverity directive defined to generate adequate information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221293
CAT II
OHS must have the log rotation parameter set to allow generated information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221294
CAT II
OHS must have a log format defined to generate adequate information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221295
CAT II
OHS must have a SSL log format defined to allow generated information to be used by external applications or entities to monitor and control remote access in accordance with the categorization of data hosted by the web server.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-221296
CAT II
OHS must have a log file defined for each site/virtual host to capture information to be used by external applications or entities to monitor and control remote access.
Oracle HTTP Server 12.1.3 Security Technical Implementation Guide
V-248530
CAT II
All OL 8 remote access methods must be monitored.
Oracle Linux 8 Security Technical Implementation Guide
V-271703
CAT II
OL 9 must log SSH connection attempts and failures to the server.
Oracle Linux 9 Security Technical Implementation Guide
V-271851
CAT II
OL 9 remote access methods must be monitored.
Oracle Linux 9 Security Technical Implementation Guide
V-235930
CAT II
Oracle WebLogic must employ automated mechanisms to facilitate the monitoring and control of remote access methods.
Oracle WebLogic Server 12c Security Technical Implementation Guide
V-235931
CAT II
Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.
Oracle WebLogic Server 12c Security Technical Implementation Guide
V-228832
CAT II
The Palo Alto Networks security platform, if used to provide intermediary services for remote access communications traffic (TLS or SSL decryption), must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
Palo Alto Networks ALG Security Technical Implementation Guide
V-280990
CAT II
RHEL 10 must monitor all remote access methods.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-281115
CAT II
RHEL 10 must log Secure Shell (SSH) connection attempts and failures to the server.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-230228
CAT II
All RHEL 8 remote access methods must be monitored.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-257982
CAT II
RHEL 9 must log SSH connection attempts and failures to the server.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-258144
CAT II
All RHEL 9 remote access methods must be monitored.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-275676
CAT II
Ubuntu OS must monitor remote access methods.
Riverbed NetIM OS Security Technical Implementation Guide
V-238498
CAT II
The Riverbed Optimization System (RiOS) must be configured to ensure inbound and outbound traffic is forwarded to be inspected by the firewall and IDPS in compliance with remote access security policies.
Riverbed SteelHead CX v8 ALG Security Technical Implementation Guide
V-261338
CAT II
SLEM 5 must log SSH connection attempts and failures to the server.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217265
CAT II
The SUSE operating system must log SSH connection attempts and failures to the server.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-272525
CAT III
Samsung Android 15 must prohibit DOD VPN profiles in the Personal Profile.
Samsung Android 15 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-216265
CAT III
The audit system must be configured to audit login, logout, and session initiation.
Solaris 11 SPARC Security Technical Implementation Guide
V-216030
CAT III
The audit system must be configured to audit login, logout, and session initiation.
Solaris 11 X86 Security Technical Implementation Guide
V-279177
CAT II
The Edge SWG must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
Symantec Edge SWG ALG Security Technical Implementation Guide
V-94217
CAT II
If Symantec ProxySG filters externally initiated traffic, reverse proxy services must be configured.
Symantec ProxySG ALG Security Technical Implementation Guide
V-94219
CAT II
Symantec ProxySG providing intermediary services for remote access communications traffic must ensure outbound traffic is monitored for compliance with remote access security policies.
Symantec ProxySG ALG Security Technical Implementation Guide
V-253056
CAT II
TOSS must monitor remote access methods.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-282383
CAT II
TOSS 5 must log SSH connection attempts and failures to the server.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-282384
CAT II
All TOSS 5 remote access methods must be monitored.
Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide
V-240043
CAT II
HAProxy must be configured to use syslog.
VMW vRealize Automation 7.x HA Proxy Security Technical Implementation Guide
V-246886
CAT II
The Horizon Connection Server must be configured to debug level logging.
VMware Horizon 7.13 Connection Server Security Technical Implementation Guide
V-265362
CAT II
The NSX Tier-0 Gateway Firewall must generate traffic log entries.
VMware NSX 4.x Tier-0 Gateway Firewall Security Technical Implementation Guide
V-265488
CAT II
The NSX Tier-1 Gateway firewall must generate traffic log entries.
VMware NSX 4.x Tier-1 Gateway Firewall Security Technical Implementation Guide
V-240218
CAT II
Lighttpd must be configured to use mod_accesslog.
VMware vRealize Automation 7.x Lighttpd Security Technical Implementation Guide
V-240352
CAT II
The SLES for vRealize must monitor remote access methods - SSH Daemon.
VMware vRealize Automation 7.x SLES Security Technical Implementation Guide
V-240741
CAT II
tc Server HORIZON must record user access in a format that enables monitoring of remote access.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
V-240742
CAT II
tc Server VCO must record user access in a format that enables monitoring of remote access.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
V-240743
CAT II
tc Server VCAC must record user access in a format that enables monitoring of remote access.
VMware vRealize Automation 7.x tc Server Security Technical Implementation Guide
V-240969
CAT II
vIDM must be configured to log activity to the horizon.log file.
VMware vRealize Automation 7.x vIDM Security Technical Implementation Guide
V-239450
CAT II
The SLES for vRealize must monitor remote access methods - SSH Daemon.
VMware vRealize Operations Manager 6.x SLES Security Technical Implementation Guide
V-241591
CAT II
tc Server UI must record user access in a format that enables monitoring of remote access.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-241592
CAT II
tc Server CaSa must record user access in a format that enables monitoring of remote access.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-241593
CAT II
tc Server API must record user access in a format that enables monitoring of remote access.
VMware vRealize Operations Manager 6.x tc Server Security Technical Implementation Guide
V-256378
CAT II
Remote logging for ESXi hosts must be configured.
VMware vSphere 7.0 ESXi Security Technical Implementation Guide
V-256648
CAT II
VAMI must be configured to monitor remote access.
VMware vSphere 7.0 VAMI Security Technical Implementation Guide
V-256677
CAT II
ESX Agent Manager must record user access in a format that enables monitoring of remote access.
VMware vSphere 7.0 vCenter Appliance EAM Security Technical Implementation Guide
V-256710
CAT II
Lookup Service must record user access in a format that enables monitoring of remote access.
VMware vSphere 7.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
V-256615
CAT II
Performance Charts must record user access in a format that enables monitoring of remote access.
VMware vSphere 7.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
V-256483
CAT II
The Photon operating system must have the sshd SyslogFacility set to "authpriv".
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256484
CAT II
The Photon operating system must have sshd authentication logging enabled.
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256485
CAT II
The Photon operating system must have the sshd LogLevel set to "INFO".
VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide
V-256749
CAT II
The Security Token Service must record user access in a format that enables monitoring of remote access.
VMware vSphere 7.0 vCenter Appliance STS Security Technical Implementation Guide
V-256782
CAT II
vSphere UI must record user access in a format that enables monitoring of remote access.
VMware vSphere 7.0 vCenter Appliance UI Security Technical Implementation Guide
V-259006
CAT II
The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
VMware vSphere 8.0 vCenter Appliance ESX Agent Manager (EAM) Security Technical Implementation Guide
V-259040
CAT II
The vCenter Lookup service must produce log records containing sufficient information regarding event details.
VMware vSphere 8.0 vCenter Appliance Lookup Service Security Technical Implementation Guide
V-259139
CAT II
The vCenter VAMI service must generate information to monitor remote access.
VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) Security Technical Implementation Guide
V-259074
CAT II
The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
VMware vSphere 8.0 vCenter Appliance Perfcharts Security Technical Implementation Guide
V-258805
CAT II
The Photon operating system must monitor remote access logins.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-258865
CAT II
The Photon operating system must configure the Secure Shell (SSH) SyslogFacility.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-258866
CAT II
The Photon operating system must enable Secure Shell (SSH) authentication logging.
VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 Security Technical Implementation Guide
V-258974
CAT II
The vCenter STS service must produce log records containing sufficient information regarding event details.
VMware vSphere 8.0 vCenter Appliance Secure Token Service (STS) Security Technical Implementation Guide
V-259107
CAT II
The vCenter UI service must produce log records containing sufficient information regarding event details.
VMware vSphere 8.0 vCenter Appliance User Interface (UI) Security Technical Implementation Guide
V-207350
CAT II
The VMM must monitor remote access methods automatically.
Virtual Machine Manager Security Requirements Guide
V-206354
CAT II
The web server must generate information to be used by external applications or entities to monitor and control remote access.
Web Server Security Requirements Guide
V-73449
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes.
Windows Server 2016 Security Technical Implementation Guide
V-73449
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes.
Windows Server 2016 Security Technical Implementation Guide
V-73451
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon successes.
Windows Server 2016 Security Technical Implementation Guide
V-73451
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon successes.
Windows Server 2016 Security Technical Implementation Guide
V-73453
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures.
Windows Server 2016 Security Technical Implementation Guide
V-73453
CAT II
Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures.
Windows Server 2016 Security Technical Implementation Guide
V-92967
CAT II
Windows Server 2019 must be configured to audit logon successes.
Windows Server 2019 Security Technical Implementation Guide
V-92969
CAT II
Windows Server 2019 must be configured to audit logon failures.
Windows Server 2019 Security Technical Implementation Guide