Details
Log management is essential to ensuring that computer security records are stored in sufficient detail for an appropriate period of time. Routine log analysis is beneficial for identifying security incidents, policy violations, fraudulent activity, and operational problems. Logs are also useful when performing auditing and forensic analysis, supporting internal investigations, establishing baselines, and identifying operational trends and long-term problems.
Solution
From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Policies on a Single System. From the product pull down list, select VirusScan Enterprise 8.8.0. Select from the Policy column the policy associated with the On-Access General Policies. Under the Reports tab, locate the ‘Log to file:’ label. Select the ‘Enable activity logging and accept the default location for the log file or specify a new location’ option. Select Save.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Information Integrity.This control applies to the following type of system Windows.
References
- 800-53|SI-3c.1.
- CAT|II
- CCI|CCI-001242
- Rule-ID|SV-55145r1_rule
- STIG-ID|DTAM009
- Vuln-ID|V-6474