STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Riverbed NetIM NDM Security Technical Implementation Guide

V-275473

CAT I (High)

The Riverbed NetIM must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting.

Rule ID

SV-275473r1147469_rule

STIG

Riverbed NetIM NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002605

Discussion

The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can be used to detect weaknesses in security that enable the network IA team to find and address these weaknesses before breaches can occur. Reviewing these logs, whether before or after a security breach, are important in showing whether someone is an internal employee or an outside threat.

Check Content

Verify NetIM uses version 2.10 or later.

In the GUI, view the version at the top above the main menu on the right.

If the installed NetIM version is not version 2.10 or later, this is a finding.

Fix Text

Upgrade NetIM to use a version 2.10 or later.

To upgrade NetIM, access the NetIM Software License and Download portal (SLD) and navigate to the Software Download page, then follow the specific instructions for the upgrade version, including checking for release notes and alerts.