UCF STIG Viewer Logo

Upon successful logon the DNS implementation must display the date and time of the last logon of the user.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33937 SRG-NET-000048-DNS-000025 SV-44390r1_rule Low
Description
As most "users" of a DNS platform are administrators, they need to be very vigilant in maintaining situational awareness of activity that occurs regarding their accounts. Providing them with information regarding the date and time of their last successful login allows them to determine if any unauthorized activity has occurred, gives them an opportunity to notify appropriate security personnel if necessary, and ensure other systems have not been affected. If administrators are not aware of potential attacks against a system, they cannot perform due diligence to ensure access is not granted to unauthorized users.
STIG Date
Domain Name System (DNS) Security Requirements Guide 2012-10-24

Details

Check Text ( C-41946r1_chk )
Review the DNS system configuration to determine if the last logon time and date is displayed upon successful logon. Request the system administrator to log in to the server for verification of the configuration. If the date and time of last log on is not displayed, this is a finding.
Fix Text (F-37850r1_fix)
Configure the DNS system to display the time and date of the last successful user logon to the system.