Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-12004 | GEN003660 | SV-37404r2_rule | ECAR-2 ECAR-3 ECAR-1 | Medium |
Description |
---|
Monitoring and recording successful and unsuccessful logins assists in tracking unauthorized access to the system. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-09-03 |
Check Text ( None ) |
---|
None |
Fix Text (F-31333r2_fix) |
---|
Edit /etc/syslog.conf or /etc/rsyslog.conf and add local log destinations for "authpriv.*", "authpriv.debug" or "authpriv.info". |