GEN001369 - The /etc/hosts file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001371 - The /etc/nsswitch.conf file must be owned by root. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc0.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc4.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/csh.login' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/environment' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/environment' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001740 - All global initialization files must be owned by root - '/etc/csh.cshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001740 - All global initialization files must be owned by root - '/etc/environment' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001740 - All global initialization files must be owned by root - '/etc/ksh.kshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001740 - All global initialization files must be owned by root - '/etc/suid_profile' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system or system default - '/etc/profile.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001810 - Skeleton files must not have extended ACLs. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '.kshrc' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '/etc/ssh/shosts.equiv' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - User '.shosts' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002220 - All shell files must have mode 0755 or less permissive. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/audio*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002340 - Audio devices must be owned by root - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002990 - The cron.allow file must not have an extended ACL. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/cron.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.d/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.monthly/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.weekly/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/crontab' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'adm' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'bin' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'daemon' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'ftp' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'nobody' - cron.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'shutdown' - cron.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.hourly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.weekly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/etc/cron.daily' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/etc/cron.monthly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/var/spool/cron' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.d' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.hourly' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.daily' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003240 - The cron.allow file must be owned by root, bin, or sys. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003300 - The at.deny file must not be empty if it exists. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'adm' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'halt' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'lp' - at.allow | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'mail' - at.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.deny | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN003430 - The 'at' directory must be group-owned by root, bin, sys, or cron. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |