STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide

V-256484

CAT II (Medium)

The Photon operating system must have sshd authentication logging enabled.

Rule ID

SV-256484r958406_rule

STIG

VMware vSphere 7.0 vCenter Appliance Photon OS Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000067

Discussion

Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities. Shipping sshd authentication events to syslog allows organizations to use their log aggregators to correlate forensic activities among multiple systems.

Check Content

At the command line, run the following command:

# grep "^authpriv" /etc/rsyslog.conf

Expected result should be similar to the following:

authpriv.*   /var/log/auth.log

If "authpriv" is not configured to be logged, this is a finding.

Fix Text

Navigate to and open:

/etc/rsyslog.conf

Add the following line:

authpriv.*   /var/log/auth.log

Note: The path can be substituted for another suitable log destination.

At the command line, run the following command:

# systemctl restart rsyslog.service