1. Home
  2. Security Hardening
  3. CIS Ubuntu 12.04 LTS Benchmark L2 V1.1.0
  4. Collect Session Initiation Information- ‘/var/log/wtmp’

Collect Session Initiation Information- ‘/var/log/wtmp’

Details

Monitor session initiation events. The parameters in this section track changes to the files

associated with session events. The file /var/run/utmp file tracks all currently logged in

users. The /var/log/wtmp file tracks logins, logouts, shutdown and reboot events. All audit

records will be tagged with the identifier ‘session.’ The file /var/log/btmp keeps track of

failed login attempts and can be read by entering the command /usr/bin/last -f

/var/log/btmp. All audit records will be tagged with the identifier ‘logins.’

*Rationale*

Monitoring these files for changes could alert a system administrator to logins occurring at

unusual hours, which could indicate intruder activity (i.e. a user logging in at a time when

they do not normally log in).

Solution

Add the following lines to the /etc/audit/audit.rules file.-w /var/run/utmp -p wa -k session
-w /var/log/wtmp -p wa -k session
-w /var/log/btmp -p wa -k session
# Execute the following command to restart auditd
# pkill -HUP -P 1 auditdNote- Use the last command to read /var/log/wtmp (last with no parameters) and
/var/run/utmp (last -f /var/run/utmp)

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles