Check: NET1288
      
      
        
  Network - Firewall:
  NET1288
  
    (in versions v8 r25 through v8 r21)
  
      
      
    
  Title
Network device logs must be timestamped. (Cat III impact)
Discussion
Device logs can be used for forensic analysis in support of incident as well as to aid with normal traffic analysis. It can take numerous days to recover from a firewall outage when a proper backup scheme is not used.
Check Content
Review the device configuration to validate timestamps are configured for logging. If timestamps are not configured for logging purposes, this is a finding.
Fix Text
Configure the network device to include timestamps on all device logs.
Additional Identifiers
Rule ID:
Vulnerability ID: V-25890
Group Title:
Expert Comments
      Expert comments are only available to logged-in users.
    
  
  
      
        
        
      
      
        
  CCIs
      
      
        
        
      
    
  
    
  CCIs tied to check.
  
  
  | Number | Definition | 
|---|---|
| No CCIs are assigned to this check | 
      
        
        
      
      
        
  Controls
      
      
        
        
      
    
  
    
  Controls tied to check. These are derived from the CCIs shown above.
  
  
  | Number | Title | 
|---|---|
| No controls are assigned to this check |