STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Central Log Server Security Requirements Guide

V-206501

CAT III (Low)

The Central Log Server must be configured to generate reports that support after-the-fact investigations of security incidents.

Rule ID

SV-206501r961425_rule

STIG

Central Log Server Security Requirements Guide

Version

V3R4

CCIs

CCI-001880

Discussion

If the report generation capability does not support after-the-fact investigations, it is difficult to establish, correlate, and investigate the events leading up to an outage or attack or identify those responses for one. This capability is also required to comply with applicable Federal laws and DoD policies. The report generation capability must support after-the-fact investigations of security incidents either natively or through the use of third-party tools. This requirement is specific to applications with report generation capabilities; however, applications need to support on-demand reporting requirements.

Check Content

Examine the configuration.

Verify the Central Log Server generates reports that support after-the-fact investigations of security incidents.

If the Central Log Server is not configured to generate reports that support after-the-fact investigations of security incidents, this is a finding.

Fix Text

Configure the Central Log Server to generate reports that support after-the-fact investigations of security incidents.