Rule ID
SV-241599r879563_rule
Version
V1R2
CCIs
CCI-000130
After a security incident has occurred, investigators will often review log files to determine what happened. Understanding what type of event occurred is critical for investigation of a suspicious event. Like all servers, tc Server will typically process “GET” and “POST” requests clients. These will help investigators understand what happened.
At the command prompt, execute the following command: tail /storage/log/vcops/log/product-ui/localhost_access_log.YYYY-MM-dd.txt Note: Substitute the actual date in the file name. If HTTP "GET" and/or "POST" events are not being recorded, this is a finding.
Navigate to and open /usr/lib/vmware-vcops/tomcat-web-app/conf/server.xml.
Navigate to and locate <Host>.
Configure the <Host> node with the <AccessLogValve> below.
Note: The “AccessLogValve” should be configured as follows:
<Valve className="org.apache.catalina.valves.AccessLogValve"
directory="logs"
pattern="%h %l %u %t "%r" %s %b"
prefix="localhost_access_log."
suffix=".txt"/>