UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system, upon successful logon, must display to the user the date and time of the last logon (access).


Overview

Finding ID Version Rule ID IA Controls Severity
V-48131 SOL-11.1-040450 SV-61003r1_rule Low
Description
Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.
STIG Date
Solaris 11 X86 Security Technical Implementation Guide 2019-09-24

Details

Check Text ( C-50563r1_chk )
Determine if last login will be printed for SSH users.

# grep PrintLastLog /etc/ssh/sshd_config

If PrintLastLog is found, not preceded with a "#" sign, and is set to "no", this is a finding.

PrintLastLog should either not exist (defaulting to yes) or exist and be set to yes.
Fix Text (F-51739r1_fix)
The root role is required for this action.

# pfedit /etc/ssh/sshd_config

Locate the line containing:

PrintLastLog no

and place a comment sign ("# ")at the beginning of the line or delete the line

# PrintLastLog no

Restart the ssh service

# pfexec svcadm restart svc:/network/ssh