======4.1.9 Ensure session initiation information is collected (Scored)======
=====Profile Applicability=====
Level 2 - Server
Level 2 - Workstation
=====Description=====
Monitor session initiation events. The parameters in this section track changes to the files associated with session events. The file ''/var/run/utmp'' file tracks all currently logged in users. The ''/var/log/wtmp'' file tracks logins, logouts, shutdown, and reboot events. All audit records will be tagged with the identifier "session." The file ''/var/log/btmp'' keeps track of failed login attempts and can be read by entering the command ''/usr/bin/last -f /var/log/btmp''. All audit records will be tagged with the identifier "logins."
=====Rationale=====
Monitoring these files for changes could alert a system administrator to logins occurring at unusual hours, which could indicate intruder activity (i.e. a user logging in at a time when they do not normally log in).
=====Audit=====
Run the following command and verify output matches:
# grep session /etc/audit/audit.rules
-w /var/run/utmp -p wa -k session
-w /var/log/wtmp -p wa -k session
-w /var/log/btmp -p wa -k session
=====Remediation=====
Add the following lines to the /etc/audit/audit.rules file:
-w /var/run/utmp -p wa -k session
-w /var/log/wtmp -p wa -k session
-w /var/log/btmp -p wa -k session
=====Notes=====
The ''last'' command can be used to read ''/var/log/wtmp'' (last with no parameters) and ''/var/run/utmp'' (''last -f /var/run/utmp'')