WA00605 W22 – Error logging must be enabled. Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WA00612 W22 – The sites error logs must log the correct format. Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WA00615 W22 – System logging must be enabled. – ‘CustomLog’ Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WA00615 W22 – System logging must be enabled. – ‘ErrorLog’ Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WA00615 W22 – System logging must be enabled. – ‘log_config_module’ Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WA00620 W22 – The LogLevel directive must be enabled. Details The server error logs are invaluable because they can also be used to identify potential problems and enable proactive...
WG110 W22 – The number of allowed simultaneous requests must be set. Details Resource exhaustion can occur when an unlimited number of concurrent requests are allowed on a web site, facilitating a...
WG140 W22 – Private web servers must require certificates issued from a DoD-authorized Certificate Authority. Details Web sites requiring authentication within the DoD must utilize PKI as an authentication mechanism for web users. Information systems...
WG170 W22 – Each readable web document directory must contain either a default, home, index, or equivalent file. Details The goal is to completely control the web users experience in navigating any portion of the web document root...
WG205 W22 – The web document (home) directory must be in a separate partition from the web server’s system files. – ‘CustomLog’ Details Application partitioning enables an additional security measure by securing user traffic under one security context, while managing system and...