UCF STIG Viewer Logo

The operating system, upon successful logon, must display to the user the date and time of the last logon (access).


Overview

Finding ID Version Rule ID IA Controls Severity
V-216362 SOL-11.1-040450 SV-216362r603267_rule Low
Description
Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2022-11-18

Details

Check Text ( C-17598r371174_chk )
Determine if last login will be printed for SSH users.

# grep PrintLastLog /etc/ssh/sshd_config

If PrintLastLog is found, not preceded with a "#" sign, and is set to "no", this is a finding.

PrintLastLog should either not exist (defaulting to yes) or exist and be set to yes.
Fix Text (F-17596r371175_fix)
The root role is required for this action.

# pfedit /etc/ssh/sshd_config

Locate the line containing:

PrintLastLog no

and place a comment sign ("# ")at the beginning of the line or delete the line

# PrintLastLog no

Restart the ssh service

# pfexec svcadm restart svc:/network/ssh