UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must alert designated organizational officials in the event of an audit processing failure.


Overview

Finding ID Version Rule ID IA Controls Severity
V-47845 SOL-11.1-010390 SV-60719r1_rule High
Description
Proper alerts to system administrators and IA officials of audit failures ensure a timely response to critical system issues.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2016-06-29

Details

Check Text ( C-50301r1_chk )
This check applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this check applies.

The root role is required.

Verify the presence of an audit_warn entry in /etc/mail/aliases.
# /usr/lib/sendmail -bv audit_warn
If the response is:
audit_warn... User unknown

this is a finding.

Review the output of the command and verify that the audit_warn alias notifies the appropriate users in this form:

audit_warn:user1,user2

If an appropriate user is not listed, this is a finding.
Fix Text (F-51463r1_fix)
The root role is required.

This action applies to the global zone only. Determine the zone that you are currently securing.

# zonename

If the command output is "global", this action applies.

Add an audit_warn alias to /etc/mail/aliases that will forward to designated system administrator(s).

# pfedit /etc/mail/aliases

Insert a line in the form:
audit_warn:user1,user2

Put the updated aliases file into service.
# newaliases