STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to SUSE Linux Enterprise Server 12 Security Technical Implementation Guide

V-217266

CAT II (Medium)

The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.

Rule ID

SV-217266r991589_rule

STIG

SUSE Linux Enterprise Server 12 Security Technical Implementation Guide

Version

V3R5

CCIs

CCI-000052

Discussion

Providing users with feedback on when account accesses via SSH last occurred facilitates user recognition and reporting of unauthorized account use.

Check Content

Verify all remote connections via SSH to the SUSE operating system display feedback on when account accesses last occurred.

Check that "PrintLastLog" keyword in the sshd daemon configuration file is used and set to "yes" with the following command:

# sudo grep -i printlastlog /etc/ssh/sshd_config
PrintLastLog yes

If the "PrintLastLog" keyword is set to "no", is missing, or is commented out, this is a finding.

Fix Text

Configure the SUSE operating system to provide users with feedback on when account accesses last occurred.

Add or edit the following lines in the "/etc/ssh/sshd_config" file:

PrintLastLog yes