Item Search

NameAudit NamePluginCategory
GEN001369 - The /etc/hosts file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001371 - The /etc/nsswitch.conf file must be owned by root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc0.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc4.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/csh.login'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/environment'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/environment'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/csh.cshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/environment'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/suid_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system or system default - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001810 - Skeleton files must not have extended ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001870 - Local initialization files must be group-owned by the user's primary group or root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '/etc/ssh/shosts.equiv'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - User '.shosts'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002220 - All shell files must have mode 0755 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/audio*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002340 - Audio devices must be owned by root - '/dev/snd/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002990 - The cron.allow file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/cron.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.monthly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.weekly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/crontab'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'adm' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'bin' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'daemon' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'ftp' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'nobody' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'shutdown' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.hourly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.weekly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/etc/cron.daily'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/etc/cron.monthly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003100 - Cron and crontab directories must have mode 0755 or less permissive - '/var/spool/cron'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.d'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.hourly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.daily'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003240 - The cron.allow file must be owned by root, bin, or sys.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003300 - The at.deny file must not be empty if it exists.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'adm' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'halt' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'lp' - at.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'mail' - at.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003430 - The 'at' directory must be group-owned by root, bin, sys, or cron.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL