UCF STIG Viewer Logo

The system must log informational authentication data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12004 GEN003660 SV-37404r1_rule ECAR-1 ECAR-2 ECAR-3 Medium
Description
Monitoring and recording successful and unsuccessful logins assists in tracking unauthorized access to the system.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2014-07-02

Details

Check Text ( None )
None
Fix Text (F-31333r1_fix)
Edit /etc/syslog.conf and add local log destinations for "authpriv.*", "authpriv.debug" or "authpriv.info".