STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Solaris 11 SPARC Security Technical Implementation Guide

V-216362

CAT III (Low)

The operating system, upon successful logon, must display to the user the date and time of the last logon (access).

Rule ID

SV-216362r987814_rule

STIG

Solaris 11 SPARC Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000052

Discussion

Users need to be aware of activity that occurs regarding their account. Providing users with information regarding the date and time of their last successful login allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.

Check Content

Determine if last login will be printed for SSH users.

# grep PrintLastLog /etc/ssh/sshd_config

If PrintLastLog is found, not preceded with a "#" sign, and is set to "no", this is a finding.

PrintLastLog should either not exist (defaulting to yes) or exist and be set to yes.

Fix Text

The root role is required for this action.

# pfedit /etc/ssh/sshd_config

Locate the line containing:

PrintLastLog no

and place a comment sign ("# ")at the beginning of the line or delete the line

# PrintLastLog no

Restart the ssh service

# pfexec svcadm restart svc:/network/ssh