Item Search

NameAudit NamePluginCategory
GEN000251 - The time synchronization configuration file (such as /etc/ntp.conf) must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN000920 - The root account's home directory (other than /) must have mode 0700.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001140 - System files and directories must not have uneven access permissions - '/usr/bin/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001140 - System files and directories must not have uneven access permissions - '/usr/usb/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001320 - NIS/NIS+/yp files must be owned by root, sys, or bin - '/var/nis/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001340 - NIS/NIS+/yp files must be group-owned by sys, bin, other, or system - '/usr/lib/netsvc/yp/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001340 - NIS/NIS+/yp files must be group-owned by sys, bin, other, or system - '/usr/lib/nis/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001361 - NIS/NIS+/yp command files must not have extended ACLs - '/var/yp'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001369 - The /etc/hosts file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001380 - The /etc/passwd file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001391 - The /etc/group file must be owned by root.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001460 - All interactive user home directories defined in the /etc/passwd file must exist.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003260 - The cron.deny file must be owned by root, bin, or sys.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'adm' - at.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'games' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'news' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003720 - The xinetd.conf file, and the xinetd.d directory must be owned by root or bin - '/etc/xinetd.conf'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003730 - The xinetd.conf file, and the xinetd.d directory must be group-owned by root, bin, sys, or system - '/etc/xinetd.d'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003755 - The xinetd.d directory must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003780 - The services file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003940 - The hosts.lpd (or equivalent) must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004360 - The alias file must be owned by root - '/etc/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/aliases.db'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/postfix/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004420 - Files executed through a mail aliases file must have mode 0755 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004500 - The SMTP service log file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004880 - The ftpusers file must exist.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004900 - The ftpusers file must contain account names not allowed to use FTP.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd.ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd/ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd.ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/vsftpd/ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005190 - The .Xauthority files must not have extended ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005395 - The /etc/syslog.conf file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005522 - The SSH public host key files must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005523 - The SSH private host key files must have mode 0600 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005537 - The SSH daemon must use privilege separation.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005750 - The NFS export configuration file must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006280 - The /etc/news/infeed.conf (or equivalent) must have mode 0600 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006330 - The /etc/news/passwd.nntp file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008060 - If using LDAP for authentication or account information the /etc/ldap.conf file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008100 - If using LDAP for auth or account information, the /etc/ldap.conf file must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008140 - If using LDAP for auth or account information, the TLS certificate auth file and dir must be owned by root - '/etc/ssl/certs'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008160 - Using LDAP for auth or account info, the TLS cert file and dir must be group-owned by root,bin,sys,or system - '/etc/ssl/'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008240 - Using LDAP for auth or acct info, TLS cert must be group-owned by root,bin,sys,or system - '/etc/openldap/cacerts/cert.pem'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008300 - If using LDAP for auth or acct info, the LDAP TLS key file must be owned by root - '/etc/openldap/cacerts/key.pem'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL