UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must display the date and time of the last successful account logon upon an SSH logon.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215128 UBTU-16-030260 SV-215128r508033_rule Medium
Description
Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.
STIG Date
Canonical Ubuntu 16.04 LTS Security Technical Implementation Guide 2020-09-03

Details

Check Text ( C-16327r285252_chk )
Verify SSH provides users with feedback on when account accesses last occurred.

Check that "PrintLastLog" keyword in the sshd daemon configuration file is used and set to "yes" with the following command:

# grep PrintLastLog /etc/ssh/sshd_config
PrintLastLog yes

If the "PrintLastLog" keyword is set to "no", is missing, or is commented out, this is a finding.
Fix Text (F-16325r285253_fix)
Add or edit the following lines in the "/etc/ssh/sshd_config" file:

PrintLastLog yes

The SSH daemon must be restarted for the changes to take effect. To restart the SSH daemon, run the following command:

# sudo systemctl restart sshd.service